Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
b4f4fd4f351a082f66c2944c1af903a5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f4fd4f351a082f66c2944c1af903a5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f4fd4f351a082f66c2944c1af903a5_JaffaCakes118.html
-
Size
57KB
-
MD5
b4f4fd4f351a082f66c2944c1af903a5
-
SHA1
8dec2e9b5282b90b37fae5123f98a30ad980c1ce
-
SHA256
b214fa0a7f31f5a4880cbac818b374dcb64f22309d18c98cde442e6831627df9
-
SHA512
a82a058a968479b4e6bb7f3406358578017393b152573647ada8eb40b80ef382a8af28b81790a61bc8876210d33e4183661fe6a37080787761fa3c0a49be72db
-
SSDEEP
1536:gQZBCCOd90IxCPFcL0EgFOnxluXPUUvSQH+zHkmvSE9Ow/05cBmdO54LVrOqD40h:gk2f0IxdL0EgFOnxluXPUUvSQH+zHkmw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 2844 msedge.exe 2844 msedge.exe 2576 identity_helper.exe 2576 identity_helper.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3012 2844 msedge.exe 82 PID 2844 wrote to memory of 3012 2844 msedge.exe 82 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 1920 2844 msedge.exe 83 PID 2844 wrote to memory of 4564 2844 msedge.exe 84 PID 2844 wrote to memory of 4564 2844 msedge.exe 84 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85 PID 2844 wrote to memory of 5040 2844 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4f4fd4f351a082f66c2944c1af903a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7a3846f8,0x7fff7a384708,0x7fff7a3847182⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13407731026752329935,11018940211103221347,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5e61897fdbb01db0f513d4b9b80340cec
SHA106656214cd352431108903ddedff49191464369f
SHA25621e680d2f11ffbf91507483b18f9363d406509e1c3dd74fa783b70fc7d52556e
SHA5124eab1ba244aa9efbd635a1c3aaf6f8463f3ead245a061c71d77aae16e3b419fc985700f53ce2ec98d75a8720c69a2bdedd2f6f850be4bb91417f0d38a9ad0cb5
-
Filesize
1KB
MD59362b80a91b900aa8b81544c2b2c81c3
SHA10f18454e8ff6ef4a78e008cbfb287aecc63d1c41
SHA25635ed69ee99899cb27b7a7a3f5bc663fe97709bb3f854485476d7243211022dd5
SHA5128f4ab14679eb7478fcb433e41f6e023dfad7935d8a233b5ba48246e9c323458872a6344dcfc78ed4a317f4dfe4d6621b31064a65bab87d2bd6dd166bf7e5f5cf
-
Filesize
5KB
MD5f98a27d347a49d58297cad899ff661e5
SHA1e0da9ec149ac5c71fdc3214103ff5d756b0ff0e0
SHA256b5b443a68ec00004d028113428e6805d6d1cadd7ed47302f7e72141a6ad772cc
SHA5126aee11e092196d0fd6746e2e480fd67d6db1aa1ce711339203124eb47611ce7a15dc1d0503308dc75eeed78d2c07e8724f5a7349e549913ed5cf79ad89bc74c9
-
Filesize
6KB
MD54489ecd6ff26ebd266b9a96d6280365c
SHA10bf1fc8609f073650e5d99e511d1a6d9ea0bdc2f
SHA2561731d32ec17a210f00a1162f955268961943f26785c798ff104f9f5f1fb7dff5
SHA5126b4c33a2b921beb4a92d541081800acee8cc3d271e5f2a7c5222c702253f216e3a9034ee562d0d9ca239c9e23b647e6a823694508d0691bce2f375d0b979a233
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD515a12fdfa639b26770647337c9e2aafb
SHA1662de40e501b1a55a9d7d5064c836e43b85cd459
SHA256c41af9a3fa778db9385b1fe569e6ca23f0c09fdd486041cdff0682c791b95de8
SHA5124939d60a9880be03fcbb85bdf5e94a759a7b5f3dd65ae9260d9cdbacdb182dc61ac528b4046f3a45c6844b3b1de527b5e187a6819040d05ece1724a8456eda5e