Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
b4f4a448329663d43f1f613fd945aa62_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f4a448329663d43f1f613fd945aa62_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f4a448329663d43f1f613fd945aa62_JaffaCakes118.html
-
Size
36KB
-
MD5
b4f4a448329663d43f1f613fd945aa62
-
SHA1
120c70ab63aeb5edff2ec21e8551d709a5fb0652
-
SHA256
572e7e5328e34262d1eb1b3c72dd8cb5cb32b1c4dcfeb58144d60f88c6007b2b
-
SHA512
6d0c0105bf0b75f8130ded213d854c06a55bde6ead6a0adde1de6055aff0f486ff0ec58418d2ec3c6647e5bbd0c35f06828df99702fb0f1ca939bb61c5352c38
-
SSDEEP
768:T84YzFihp5zHm0kl2RQa1Iexjw4M/aD0FmRTIoc:T84YzFihp5zHm0kl2RYEjvM/aD0FmRTi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 5068 msedge.exe 5068 msedge.exe 2780 identity_helper.exe 2780 identity_helper.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3860 5068 msedge.exe 82 PID 5068 wrote to memory of 3860 5068 msedge.exe 82 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 3124 5068 msedge.exe 83 PID 5068 wrote to memory of 1368 5068 msedge.exe 84 PID 5068 wrote to memory of 1368 5068 msedge.exe 84 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85 PID 5068 wrote to memory of 5084 5068 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4f4a448329663d43f1f613fd945aa62_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff6e146f8,0x7ffff6e14708,0x7ffff6e147182⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,7639436242700354206,194112644184925520,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD540e7439eff56191a04912e64ae2f22ad
SHA1d36cb65fc14860c6d61aefb35869a41fb22e2e27
SHA256a4addca5174fcec4322cd8af0998cbb2887f7d35944351bf92689e367700534b
SHA5121a28c51ae10736408bb74f80af00a433121b7568cb471152ad5e03a59feaaf21f03f1e8baf31dbe10604f7b045fe9340808e2adb40e76798c2c729abb372f9d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD51f8fb6edc434fcef875382ad89a22ef4
SHA1017b104a97fd19727c37c540dd97147234815a2b
SHA256d87ec7e598dd46f465f8c2deffa47b5d85f085f03fda7e019f0ddad0fb3078dd
SHA512925b598c3157df876c22c8942922adba856eb83175426971cbc189c0be80dd2c608e15b22f4c4c4802b1a35d57f3d6326c785ea8a5491a63138e904221245301
-
Filesize
1KB
MD5b5d45b40b5e4c3f2241dc03b2d2be1b1
SHA11ede5f6fe6f15379f8b026289a5454c2432c3683
SHA256229a6039af84924ff4f47264a23bb385177dada2dc90d2738e55898b0bf3df78
SHA512a1df9b9c336ed3f511a09a293c8adb39af13bbcf18f67ca305f18dd9da4a63c0373a7af483eadafeba79050dc080bf3607b35d90c92f55d03dc1958cc590d17b
-
Filesize
7KB
MD52e1f2bf39ed3b4a6e1ccf2dff9ef1419
SHA1497fc7f6ae593692726363a7c5bf01febb0f4e66
SHA2561dae46e4cc49c33bd07b8ad2d695cbcb4cfdfb114a73d2b6ee108f642fa23699
SHA51261bea42d0e8b4954f1662c847dd7ecd11898bdd281e65ebf0f396f31f13ea308fff88c8db23f8e3bd8ec4727c9e754a468d62f8a362d771d660d0f6c61654e2b
-
Filesize
7KB
MD578424292fa603558231b661a0fd2dace
SHA12dd31da8fe12cd48ec1e1ea36de686c5fee6712a
SHA256f39d6aaa02f25f0be90191c80c18c26bc6c4f15df9fa84889f10b763400ffe7f
SHA512b06893481755dd9a1351694e0d1e0eb77bb4228ab476f2622b7ebb76acae2fc44d95a796ab7d09d174701093bd811c49f6cf17960e0e495ac9c92e7d650f1015
-
Filesize
5KB
MD5d2c29efabb3de826fd69956757a4ef5c
SHA112e372a6a06fdd102d460de7ebe6c776b08a1114
SHA256719d445816d6d3f4da5a401fe65be1f7f85d6410dd51d0766cb75952b75ad8a3
SHA512fe5e59fe6c6a81cf2c08cee944cd2ae0d100a4b13b74a0fbfeb3a38d3146b62686bf556b98ab5621f6b1a3c90cd23b42993a25ecc7b581885769d23d8ecc3c57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD554e6357f63e06f2b7d5868b7bdfccd51
SHA1e7c599b0fb720e23047616accafb14a7a674e512
SHA256bb360962fb1b9fe56def4179b2c9d23f920f2090387355db036f3a85b055fecb
SHA5124c0d82da1296b786d6812b41518b8a0b54f3adbc056f676cced5e5dad9ed4772f3b27eb269150aa08eacdcaf8ca11a4a01dd239ab5a5c405982db4ace2e09257