Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
cd2bc9d9744e028efee846f25faa8c4b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cd2bc9d9744e028efee846f25faa8c4b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
cd2bc9d9744e028efee846f25faa8c4b_JaffaCakes118.html
-
Size
277KB
-
MD5
cd2bc9d9744e028efee846f25faa8c4b
-
SHA1
4bb6e117bb868d63cea94a5fc6ce1cd99a14723f
-
SHA256
61d8063d9f8b9aeb25011215e8204853211f7159601d12701ffac6e7ac5625d1
-
SHA512
3121c6b03cfe42105fc9618cb19d0e436df3ec5ce52f6de83e5772641e8734ca93a41b0873fbbc2b6f494c5cbb06171b778f3a5bd6fc4e527e474dd86495276c
-
SSDEEP
3072:cuzrxTm+76i4xVR2yH1ouYqE2fZLqSE6MrkPuKbW:cuzrEqV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1428 msedge.exe 1428 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 812 1428 msedge.exe 83 PID 1428 wrote to memory of 812 1428 msedge.exe 83 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1148 1428 msedge.exe 84 PID 1428 wrote to memory of 1696 1428 msedge.exe 85 PID 1428 wrote to memory of 1696 1428 msedge.exe 85 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86 PID 1428 wrote to memory of 1400 1428 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\cd2bc9d9744e028efee846f25faa8c4b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffb993b46f8,0x7ffb993b4708,0x7ffb993b47182⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11148367113273638954,3553079695850364801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD539f63849c9f36b3feeb092c189a3db20
SHA18a4e6b2b902e3f7cc703105c44bd7b1cacf5f2c6
SHA256dbdf4cc708505c41d6b49d83eb90bb055cd72389a9e2fe96530e17cfe980d2ed
SHA5129753987ad642339a51e4a1c46399ef6e90acc93bab81424025c522a01b98dcfef806d3c333a3749d731ba4f056036e7c75a9a82323770aa5d29523b6945b9570
-
Filesize
2KB
MD5a6eae67ce4378946b5ed43b2a0d2dd6e
SHA1e35f58347d0ac5406aca17227a065d3449d852f1
SHA2561a9ce8bd46c6c68ea852fcda395634422b877e947949cd455b3f50b20a80f397
SHA512793584313ac545d40f7d66e83e9ea7029c9817d1f1707620eedfed09d8100169a71322b0b05541da89424963f7b2a9468fdb3634b2ccc9699ca9e6f7cc868018
-
Filesize
5KB
MD5688d72b7cf53dad60a35bcfde2871b56
SHA1b6da593a3e30ae8c712090066c71b32ba0b5cba5
SHA25621924228d3d9a852c27039e855dcae68c17f1a86d613fe8f5aeafb1b9d1ff08a
SHA51255d363d5ce39015ad6dc7bfcb74b977fbd132427fa645355264e7f051ad9eeee94794ed0f78bed1bd025eedbd38e9f98cdbe2809c740dff5579a2dd98771df76
-
Filesize
7KB
MD516000403755cc97d46bad2bdb5734169
SHA1005e610c66795df3921397c3225e4d259e3bc4df
SHA256d02bbc77aa7d758a8b0e981d73bedc5b983344afcc43496874d8d719dbf8367c
SHA51265e5a380702cb38ee15edc1d79e4add40f203ec482b590032832ade24abe33abf3a88223ea5498cfa5bc1ddf8a7a63e97f87d924b1f136859f7f49e5593d37b6
-
Filesize
10KB
MD569a2e5ed5f1a4c77f48992532058c4ac
SHA174fe5a52811843363cb63739c51cb4bd98f8e97b
SHA25635e838ea1e28f5ac5e2987c85e3aecfcd16b514732c6385a41b2864aff6bd5db
SHA512ad31529a76fe71811aa0202df357bd1cf206eec51f6031557af832a6e446987c92ecba0000753757c1a24d03899856813fee65a615f8e69f16937a420d2b2af2