Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
c13ee25ec84179874916f207e4dc547c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c13ee25ec84179874916f207e4dc547c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
c13ee25ec84179874916f207e4dc547c_JaffaCakes118.html
-
Size
80KB
-
MD5
c13ee25ec84179874916f207e4dc547c
-
SHA1
ea228a812af0dd3c07752248c0fea59b447eff6f
-
SHA256
4c10c45cc884a15585b33278e134fa06c3b1a6319649fa62f9809c88d78c22e1
-
SHA512
79ecfdc5541b74ad2cf71c91e1e32009aca3b0df1154d2cc107907d121f25c402b9a8ee2bae729ae25c1bbb2758f7f7b8e96fb4a4909c2bd2f72107e7b13100c
-
SSDEEP
1536:A+QlzoarSwW1qY3eUU7xkXI4nodqh3WSMtr9:BwW1FOiIUodqhmSMtr9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe 3584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4480 4856 msedge.exe 83 PID 4856 wrote to memory of 4480 4856 msedge.exe 83 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 2136 4856 msedge.exe 84 PID 4856 wrote to memory of 1416 4856 msedge.exe 85 PID 4856 wrote to memory of 1416 4856 msedge.exe 85 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86 PID 4856 wrote to memory of 3368 4856 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\c13ee25ec84179874916f207e4dc547c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998cb46f8,0x7ff998cb4708,0x7ff998cb47182⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1864 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6023090282146515826,9558762132385519249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD58f0b74ec9d59172bd4c47b3855ca1485
SHA1d0b2ed39581c985055806192ac8b9670f3a2733e
SHA2567a3a0958a8b2fa6c8430fa465ad44e09a273818fcdb3dce61203281760b71be6
SHA512e0ec82b2406ba44af6a01dba32f171c9116c9ce31b628d7805028b54e72fc9523d6a66f28a9d788bd7d475239cebd98a7ce48acb26f65b6e0767245f531b3055
-
Filesize
363B
MD5aead17d87ec99d291aa2737c47d553ea
SHA1a7eb6f7730b67c642054efbdb28797eda614ca08
SHA25697224f9eaf7264f4ea9b1362f8fb459ef50e06108c18ec59187eb0b08d5b5dfa
SHA512277def65e53eda917ed9ba6cf284c93deba22675aea682dd3d9336644c1267a6c212086452906f8eca8683db9ca0b98c1f1b23f72436fe21ebbf3c9dfe8d5ebc
-
Filesize
1KB
MD5efbe77bc9d695a55387eddd1e3f739c0
SHA1680f4b08a6b065ebc5352f519be15a5046210652
SHA25641ff75532c97da04f0925dbcef75e75c1013b935073bf3620a9d12d1c3fa6b7b
SHA512640f19b628e037315c428a47f892453ce9e00e7197ece859d7e2d7506403ec0aa832a58602dfb0b22c46f0ea8e888663a4aa1cbc507e564a2d1493f6fe0979bd
-
Filesize
7KB
MD5d44b9b7d1da7215ff9463047c018c3ad
SHA1573389bb24066cf88b1f442f5e5ca737c1bd7e19
SHA2569fb05298a1f57d7530c6db718e3120de750a094f12bbfa37c427240ab41cb3fe
SHA512d260012f17884337a1ae604005a5838992560fe83349264c9bf7319f75c50747119526c56f583887bcba60114f219c7f3dda215f19d55ae532c38c97059e8151
-
Filesize
5KB
MD50e8766f1fc0ccb7c672e0cd55a11fbd9
SHA1bebf1b98a97b7159fc4b467aaa36a46426c31180
SHA256dbdfa530ca1e0d0ecfcf8ab665a5abeb95704393c2540ca63b198e8b1cf93d70
SHA512f71f80f89ce2d131e6dab6899504b3049b87b8aa3c98aaf4348697e19d3700dc3630843f61809f7ccc0172105c64f3de29a85022e74aa38f8a80a49271eed0f9
-
Filesize
6KB
MD502681646b72479c025f902c9f25f11ab
SHA1545fd877ad757107c682a3bb343887ab317f54a2
SHA2563ff538c58be9cc469ac9b8f1606a409a8f15a323c0314c7010d9379cc2757a62
SHA51286a35b2a6c4823a4d8b5b230af30dbb648cd669191a1aa623133bdabc30d6dd726792a0fd6ba68d0d580a8d69387f4a8cb021411e9417f197d028a0cf7601814
-
Filesize
10KB
MD59815a29638263ad52254afd02b9906b3
SHA109011a74fc58c332f6cb40df128b1f995a39731f
SHA25619bcf2e0eaafd78b5857f4d9e4bf6d8db13542c1d114dff392cedb72dadbdef6
SHA512cc5df7ba96fa539ee38d5ecfbb82de74fed94ebd60d13338753bee9ab812fa567946b3af8960d6b81eaa08b4591a958427cd972251c10acbf5bcef5144b44ddf