Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
ca8f3f50033bb19a8cd70968310491b4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca8f3f50033bb19a8cd70968310491b4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ca8f3f50033bb19a8cd70968310491b4_JaffaCakes118.html
-
Size
173KB
-
MD5
ca8f3f50033bb19a8cd70968310491b4
-
SHA1
324b03dd0bf26699e24249bad97a4f452e5be80e
-
SHA256
6d4ec0ef7a9ca3d84f1a3ce4cffc8f5c9d78aa799a53594d22bc0d16fd7c053b
-
SHA512
e971f34d75c011251dc9f4ed7872e1de80b0487d7395bc0595ad7c08a4af02d5caaa8ca4313f9b8474db1e4d7e7ff2091ad0dbb6da4bedef7bd8db693172d2eb
-
SSDEEP
3072:kSHZpB/de+NP2dw9xHfy112qDJZJgJOJaqzLC4i+kDBROH:kSHZpBM+N8JZJgJOJ8k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 5020 msedge.exe 5020 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1600 5020 msedge.exe 82 PID 5020 wrote to memory of 1600 5020 msedge.exe 82 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 916 5020 msedge.exe 83 PID 5020 wrote to memory of 1612 5020 msedge.exe 84 PID 5020 wrote to memory of 1612 5020 msedge.exe 84 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85 PID 5020 wrote to memory of 4520 5020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ca8f3f50033bb19a8cd70968310491b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb400f46f8,0x7ffb400f4708,0x7ffb400f47182⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,497027716802908331,13767092308812535813,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53c3aaf763fc0c4669c68bbd7b10c72a8
SHA12a715f75d7cd4a29e755586bedc3f285294439b3
SHA2562fdf3bdfe5827a41e3e78014894fefabfebf87f107def0b3a7ebf0c2da553bc3
SHA51235f921026845da0f58d87b2e060eedf9a1a08cd4ef08f57c2e5bf0c17cde84c052b3a48654f63147cda5a7cf2305ca6f4d4924a5bc5915674a716791f6394ae3
-
Filesize
1KB
MD5dd8fe206900c6e8ce5eb7ae0fdabe8f0
SHA15eea90ca69fcc776666c5d416797993b7dc4101b
SHA256c96fc7ddf85459faf031e75280f7eaf0c0e9ee58abd4acd74597debb55f19dd5
SHA512d0b3a9410b2e993775d55b086cd95655116889d7457f85fdb72ca2e369867ea93a89bb3e42d36801069019fb2440a031f1ac688ad095c1d2a3a985c09654ca77
-
Filesize
6KB
MD591de820d6db0cba001abb5c27efc2c62
SHA1f6449500134687891492017decd210ab3ae8227c
SHA256dd2789778d97cefeef1f4f24d3b6c5f05ecba59ec09232f59b07a698780c7893
SHA512e20338961adb7c2703e9703d190d76c60af2cefe6f42d1ab0d275c8ee773f099052f6a0b2f5c08bf18102901e8358ce58d5c555412a37708a396fcb764ac2bdb
-
Filesize
5KB
MD558f0a2d4e7a3fcf67e6fc7e832b6aa6f
SHA12b1406b9de1f31d22a58473e6be481ec73b27a89
SHA256e05ee6de96113e8b54e3935c5b04a5dafaa1f0133fe3cf3a4fb733643b980cd8
SHA512676b5f0ac6d69d4de26c9f71c5851e7f1a313efe5008f18b3f2d885045858624c65beb9a31ff01579d89012c11710da12b2d7a215b10306ad58788177fc94fef
-
Filesize
10KB
MD5a94385bc6a1d594dea1e56e4d22bef5d
SHA1e998a505d0d5e923f3c7959572b0c7e0a47ccbbe
SHA256e171d307a616d899adc507914ad63d3f66dd2ce00ef64882c47f57ca6461221f
SHA5121ff55179318a08da2a6d1cfb4811f2300c781293c450340f89b3abf21c02bd613a4474cb9f813c4eed8343f378bed63b34c83d0b6a6ae20d6a88b0c149ef7586