Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
b4f3e67789028490a1138814ac11586a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4f3e67789028490a1138814ac11586a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f3e67789028490a1138814ac11586a_JaffaCakes118.html
-
Size
86KB
-
MD5
b4f3e67789028490a1138814ac11586a
-
SHA1
3f69e0cdba9b351ad393c1eea5fa21d572d31dd9
-
SHA256
db79e1084e1ec00e88fa2595f4f2fa55842340fad791d7c0011a20a586df3976
-
SHA512
ca24468dfa811c64e0d1bdb667b654b89f319284acf2db5b8afff07e6f60bedd7b385ea1ff0e684b8e64657449869061c341a1371ad8b506d9d245f09059913d
-
SSDEEP
1536:3ZrnzLqw/8vv5mUlOLHfhOmTQVAUtmEZ4yAiPFApmuHSbQaiNmu:3ZrnzL9UloyVAUtvZ4yAiP1uHSbTiND
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 1904 msedge.exe 1904 msedge.exe 1100 identity_helper.exe 1100 identity_helper.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 412 1904 msedge.exe 83 PID 1904 wrote to memory of 412 1904 msedge.exe 83 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 1092 1904 msedge.exe 84 PID 1904 wrote to memory of 4444 1904 msedge.exe 85 PID 1904 wrote to memory of 4444 1904 msedge.exe 85 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86 PID 1904 wrote to memory of 4092 1904 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4f3e67789028490a1138814ac11586a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9da2546f8,0x7ff9da254708,0x7ff9da2547182⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,2501109162659226735,9797810373829640844,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5a63564c855fd32974f5fa4edd96107b6
SHA16c7eebdd349f4b6ec3ffc1f667dce97c70d9319a
SHA256286778e58ce7648e9c117809ea07eede6d60691aebb8c8e83ad74c06bca81351
SHA5126be2410f15d038840c11d1a03500d085bc1a5f227890d2de8b8deddb5bbf231049f96658eb9261e7536ee48692051a35244c206ac932acd18198f24cbec4200c
-
Filesize
1KB
MD5a816da8dc8cb05c5802eabe35c18a854
SHA1f662545508ffdee969e9add671bac8c151204a27
SHA2562676c84ebdbf8aeb46daead86692fe2840aa1f087199848e412476be975610f2
SHA512d124ee8f12d4d7572a81eead53b2da094f45305037afaff0202445c8af0cc2d7f081b3a850767b26477983c18c98a87ca2708cb4414a2dce33829301cfc7239b
-
Filesize
6KB
MD53ed7f49c7764bb66c68529424716e7a8
SHA121081424274884a4b5dd5cc4613e2d5a77de769a
SHA256c20de769ed45f07fe15a0ab77c4aa376e310162e6348bc3fe55bb733606322d2
SHA5125566a51271a727348edc232a155551b5234283e2b51ff3bf38fe8318695920cc3c78faf8bf0fd71507b8463569bdb7d6a9baba96cf07a61f9e12fa61a7b00fd7
-
Filesize
5KB
MD504060806bc608722e3d2f652166a5c55
SHA14194412a79a2f27de442532bd9093f80881285b2
SHA256b384aa25b24c726031204f1fafe433f21c4fe8aea38da7420ad87ad7d631b97e
SHA512b2a1c4ed60ea91f7d69be4a1375fe2b3abc83e074e29ba8fa48cbf69c025095c16c4eba5c0aaa5ebbc015a6f1898e506f564ea26181258ba6961ee5e735b0b1d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c18ddbe5d407682c66f2e951becd0fd9
SHA148366b1baeb3a42986d38a0f2502e9e02370fff1
SHA25673ae3c364ffe1fbe683047bab7857079e4624d86cde81fb11116796ba28a9b5e
SHA51282740bbd8dd85c003520632461274e4325d0d28dbabc6ee230c43bf1809b3b7a5e3aa9e8d5dcf12acfdfc24994dd79f437bd1ac8cef1395640a51d40ab94e53a