Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
b4e8d472edb6f6556f9c36b73cc4a370_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4e8d472edb6f6556f9c36b73cc4a370_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4e8d472edb6f6556f9c36b73cc4a370_JaffaCakes118.html
-
Size
53KB
-
MD5
b4e8d472edb6f6556f9c36b73cc4a370
-
SHA1
b08eed7156df4d04080e3a7a80b38e09f423547e
-
SHA256
a8ba66c6418c05de0971e8a391ae0ed1a48704a80666c8af05bca09663c3c68d
-
SHA512
e825173561cde8979c23612509694f2c912dcd7112ae125a515ebe62d8d79ae253441c64775a6b26dcad6379ed09cc4894da35fe9ac50493843010c8e2538397
-
SSDEEP
1536:gw5GAzqzS9dZadaPSAAOz/Wpn9Imvsuz4zYBI67/WvBiow6S8BePTEoVqQ:gw5tqG9Maq2z/MMukJvBiow6S8BePTEE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 4024 msedge.exe 4024 msedge.exe 4460 identity_helper.exe 4460 identity_helper.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4532 4024 msedge.exe 83 PID 4024 wrote to memory of 4532 4024 msedge.exe 83 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 4488 4024 msedge.exe 84 PID 4024 wrote to memory of 2252 4024 msedge.exe 85 PID 4024 wrote to memory of 2252 4024 msedge.exe 85 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86 PID 4024 wrote to memory of 1968 4024 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4e8d472edb6f6556f9c36b73cc4a370_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd71646f8,0x7ffcd7164708,0x7ffcd71647182⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6977945515621143208,11233887700470200438,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD502234af1564a8a98877de5c1a8702ca9
SHA1547ae14023ac633436ab81205ad8515e02521c8e
SHA256923fc9aa112cf88f01fb385232d3f5b694e02e662d43954b7430db5b6f50c919
SHA51200d5d7d0b13c192ecb9ba24761b385a682e496daf5c12843d6d50e91fb23c79235dacc4ad2db35ac22bee6b67928607e64b0a5cacc01566f1e588927cf086520
-
Filesize
1KB
MD5d4441f30e9431b1d08c3e39d30b912e5
SHA173a2ac4d253d7b7982d8f5ecfcc69fababbd7400
SHA2562c7c4ea58a833fce851b80cb7cbe508b27e6a8a71e14878e96ed797d4fb61321
SHA5123f633340d421d5d241b80ded28f25109be59e9a1305872b9e001e7b435855c472e6c9c3a5ba4751965f853137c0705dff74b747e053493bff351530800845054
-
Filesize
5KB
MD5b4ccba82a85b024dfdcce41d1367e13a
SHA1884324855dd2d829c9cdef9c75fa9b866cc1d52e
SHA2569fc3a862a630a83f8f68954f8d1f4f048f6755c33a268539ad7b9e55024e1d8a
SHA51281077ae78f53070707ec47f380d5e6538340d4ca753645425f165372b8e5bd48b8f22358311adafd82b6e46e99a05f88102a69608631897cd00409c099be045c
-
Filesize
6KB
MD50443e35db5b564748c42ad078af89b39
SHA17df18560644b9e1ea3ae80c49bb55835b129b425
SHA256ad224287157f758ea505b3aaca6eb42ccbc83a21f9f5ffd3fa11a1dafa1044f4
SHA512f329704eb11ff915f7822103b33d7e8087d94bf177e1e7d7035fcc955fe5ed9e50cebf25c58d74feec50084ac8e34da0e8dfe951d452a4cf17a987d9078f023d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ba02e23cfdc1a998205718f4408d723f
SHA16c51ce2fb015ba955db5e960f53f7754e578de3a
SHA2565fc3050d97ba7320afb2cd3ba2284f08d156390dbd9960c25acca3d99710eec6
SHA51293510160ab585037a1ab65d0d0c2ecdd1e304101a85e217b32372d850ac06e0c6aaa44895b5abbabcc979d14c87d6949825a934b6c26d9c8f701b4c2ad7dedbc