Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
c8437b2a39eab1d7b03cd38999ea2078_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c8437b2a39eab1d7b03cd38999ea2078_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
c8437b2a39eab1d7b03cd38999ea2078_JaffaCakes118.html
-
Size
78KB
-
MD5
c8437b2a39eab1d7b03cd38999ea2078
-
SHA1
d1410a4913a1f27cef4932c3e1067e14835e1095
-
SHA256
b4c56964284aa0456a8c65fad7fcade82cb63aa0216c798a40a7ec1e37976ca2
-
SHA512
e2e1948e50eec8a6d7b5e5721b34d8867c521d21851c7d3e58bf1891cd32df78421d634b74d51179c7493e91c31c85be77a0299b0b8bfb927d928af27c4e8bac
-
SSDEEP
1536:EirO/grfrJPia6a5ITmhoIVyb4yhbsk8zz:NrDJata5ITmhoIVyb4ylsk8zz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 2792 msedge.exe 2792 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 3896 2792 msedge.exe 82 PID 2792 wrote to memory of 3896 2792 msedge.exe 82 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 3744 2792 msedge.exe 83 PID 2792 wrote to memory of 4520 2792 msedge.exe 84 PID 2792 wrote to memory of 4520 2792 msedge.exe 84 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85 PID 2792 wrote to memory of 4820 2792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\c8437b2a39eab1d7b03cd38999ea2078_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4ce346f8,0x7ffe4ce34708,0x7ffe4ce347182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14748096486777340496,5695422194555744966,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5027aa5185db4c3f30a8e014c22e8732b
SHA188735e9a2e8f18fee473b59ade3ffc42825e5953
SHA256e4dece621fe411e85c8b76182ac0d83274fbdb0f291f2fbca35f2667ceff9c62
SHA512750fc1fb79b0fda14a36795ef8a411b41166b692ac227e96d6e23c71a96cdb022ab2d9819632be5f06e1a915ac48502e6627dea9082f07b895cdddd2e863d253
-
Filesize
1KB
MD5dcd49b9ec6d735130fe1ffff572428d5
SHA1f6ce70f454ff626e1542ba42e56e56fc28267397
SHA2566285850c012c9a34c392bae41e3ed9e3c055adcabd88741077f5f6833317fe6c
SHA51241b5afb4e3d3df30a8af115e4225f89fbd36d82257e4eb237f4a37762df26151705565fe73e867d1c9e18e1cb90f0a7af9be59961d9b6c946509c2327e596311
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53806042f1753547901c12659ff7bb794
SHA131e77000d0e7e0081989211dd0495309f6e555d3
SHA256b88d1922c3eb63697f703fba6a712a1438b4d1aa674c3c96340b7af4d1646a29
SHA51279a9c6b50b76bcc751369912706339427d93331c3a9bc13824153b0d5ef0fca88fc7a583a9a0b85dac5e33daef8a8020f698a7cc040a280907ed0941d8b1ba7c
-
Filesize
7KB
MD5ad0b20a428d4941fdd9b2f6a856e1e40
SHA15bca1bd0bce73cc4db49de8e4cbbdd1e95945974
SHA2560762248a2ab9730c905602a7572f0d6d8ccb241bb9d902b041473e6b19e295d9
SHA5127679c1649afd08271e18046d27353fb7534593b243af2f8cd4706a021a24770460ff1e4e105be049cb48eff0605010171f034379faa9bfaa2dc01b77a883128f
-
Filesize
10KB
MD56e5c56f8e8dcd450d7dddc59fe361f01
SHA1af54c8a3268b8d4f027ecbbdf397efab96d568e7
SHA2563fc2dddda2863c9e89b7ead55b0866fb16179cc596ed986e43ea660336c3a4ba
SHA51230760003124d26b489ae12898f821b1c4f9aeaf47a2bc59c14857f5fd23a7851611894971ae577b83b5a1d8f25f7fd46c9287b23590142130615088a822aa273