Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
c86c20225a74bd0b4f73b099e23b2e69_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c86c20225a74bd0b4f73b099e23b2e69_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
c86c20225a74bd0b4f73b099e23b2e69_JaffaCakes118.html
-
Size
54KB
-
MD5
c86c20225a74bd0b4f73b099e23b2e69
-
SHA1
72515a7ab42e8e0cf858510685c5da01e171f2b1
-
SHA256
916cc87ec9e751d43ac0437e2aa7c5f7cf73158c767318f7e406a81b6afa737c
-
SHA512
3fc77ea32bca4b4cc9c35174bf10ccbbea24b4ab429c05c9f62468a4cbc941eac39d69f245d15903fc2aefe46dfa9a36e7c82363e3007c1504d29eb8375d9088
-
SSDEEP
768:/QqlLXZf0HZipkmlpK2K3+V285dAWQzQrh2CSl:/QqlLJUipkmlpK2KOVnf4QrKl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1264 msedge.exe 1264 msedge.exe 3228 identity_helper.exe 3228 identity_helper.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1328 1264 msedge.exe 83 PID 1264 wrote to memory of 1328 1264 msedge.exe 83 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 932 1264 msedge.exe 84 PID 1264 wrote to memory of 1620 1264 msedge.exe 85 PID 1264 wrote to memory of 1620 1264 msedge.exe 85 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86 PID 1264 wrote to memory of 2088 1264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\c86c20225a74bd0b4f73b099e23b2e69_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6d5146f8,0x7ffa6d514708,0x7ffa6d5147182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6872 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2376 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12738612814222527816,13409719003656327350,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\24da1128-c99e-4901-a6d3-9da06875ac78.tmp
Filesize5KB
MD5562d1bb8cd0b2384819ee620f696cb25
SHA1b76a86d54cc9fad5041b08c88cd31597100b6e55
SHA256836be7bb1c3797009327c495f79f25de28d94798644f958e945ce43b7de6179b
SHA5122ad6c6486afaaa2c8c671d0fca8787df28cef33f56cdf728d9fd7a30609e55968eec7dd2cd1b001ae639a95b0485e71b8b5d95ce50cab79e9b5f8dd78f7d203e
-
Filesize
41KB
MD59631c594f55c395f07b12046cb8fbf9d
SHA1cd6532d1689166c19477923c73083eaaf8cd21e3
SHA256a56a5d0f5f612bd39fb02fa1ff7a721a33fcb841f40c48757381b3b7c4a25726
SHA5125d3bada46dbc583755c279b5ff3c155e15f16d51b6522752ab289bdb62b71abe1d91def5733ef7e77fc01d127508d07e2c67e731bde26a478c4780c8918ba105
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5547204a3ade31ff6f9cb24a04a81ff76
SHA1a32a630358299621435dc085a63ab1d4e336d4f3
SHA256f140790397f9e65e72e2aaddf2746ece787501244f4b3d0fc491da2b2b7a1d6a
SHA512a6e2d8eb526601c2e5263f40824956d6e2fa582d637722e978941b4d2e4a627d9f96da276139ea17761bab6cb5c48fc5253cced3e65f7ee78fa432779fb0651c
-
Filesize
1KB
MD55699bdd5ecf12293169a7cf97127fe29
SHA178264b6283196b29a2b00de9909487728ac70419
SHA2564736e74b68754886589151eebf98aebe4c2f76bdd3b81fe90a55a15c447db13f
SHA512d5b87a55876268b79cbc150297d004cf5ad3fdd9e850923641e243a6fa4c68a107239219605081943a8fbafec10edb792803d263e82ea1e62d19af1c37826e74
-
Filesize
6KB
MD586e56d7c171f574913228eb1302a4446
SHA1c30f5938d914086aa8a50667d26a7770cee072a4
SHA256696e027abd14b4eb49ec950e708dd833e125d45970b50f1762930503b1af9015
SHA512c5d716dc04dfdc690addb0de579ea287509559e69da9b3256a2715cc374289aa65fc312afb31411e611845283e82a315c4c24ce0e18e5d8421e3288b29f23251
-
Filesize
6KB
MD575a65dec20b3d32c2ac694d0118c5102
SHA1e5d1d7e6fd38ad318be926725f4d9b1906b7f83c
SHA25673b1fcf8a1884d79cc0ecfb389acfc60faf2d37f3fd24ec6314960d8599c9533
SHA512169833e5e9f3e745c9daea9a83b95a843596a2c92f73739f63536c1f1346a7d81ed5a566136c361eb09abc51da29d47834c5beeb0a0ee66066613ae6997712ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56beb7b46ba92139ef6fe4fc96a757fac
SHA1230cdce7812fe553c67e8a82ddff8000e620334c
SHA256a1c7b223ed411b6b84f227caa025ac9b622fc1249a42a05c216fc3618c1886b3
SHA512aaf1b9a56a4482acbabd5d72540b7786f507394efb6fe674d52a99baef480f025fa80a7b9ced8569240e972eec026a5c5d2d9a9d2dbb69f752397cd7ae92f704