Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
d3c193046a358d7c821209f439d12c92_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d3c193046a358d7c821209f439d12c92_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d3c193046a358d7c821209f439d12c92_JaffaCakes118.html
-
Size
268KB
-
MD5
d3c193046a358d7c821209f439d12c92
-
SHA1
c51c70303f9ca221888727d001cb4a4b0d9eebbd
-
SHA256
b51eae724a09dab872765cd5fb5afbc82120b1d7d8db96deb3165807e2cd38dd
-
SHA512
378a1f7ac3198f1d6152baea31b07a57cb888ac167ac774c787b895492c762c17b26f1a541ee3adbd23139194f2f9ea6f41a459d28b9d5f74e3c3fac72960b56
-
SSDEEP
6144:FEuikcjq7b/GapDbW88+U+9o8+N+8+F+s+b+kN+jiB+Pf+3V+6+R+Bqf+d+V+O+r:tikc4LpA+U+V+N+8+F+s+b+kN+jiB+P6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 408 msedge.exe 408 msedge.exe 1348 msedge.exe 1348 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 4552 1348 msedge.exe 83 PID 1348 wrote to memory of 4552 1348 msedge.exe 83 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 4164 1348 msedge.exe 84 PID 1348 wrote to memory of 408 1348 msedge.exe 85 PID 1348 wrote to memory of 408 1348 msedge.exe 85 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86 PID 1348 wrote to memory of 4452 1348 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d3c193046a358d7c821209f439d12c92_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa68646f8,0x7ffaa6864708,0x7ffaa68647182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12915776480928495436,9612772930699698183,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD506beb1909530faeb4736ec6899d05887
SHA183c84dc335bd325b8e122dc23c5219d26a739de9
SHA2563180121a09721f1fecefc0200b1b6378f9ae9cd701e2622c3341f7c42fa1a89a
SHA512e116586788849470cc75382067652f58e21535463629e52940e68e36663edd22141ae653e93902a357ef6115cf5f165790b3a2976588cdc4437386f660c0d6bc
-
Filesize
1KB
MD5eb4e28fdb5dd3842c919d93d67124696
SHA13fe9dec3b75db57f7c304cafc098f8f1c42a035d
SHA25608f9a8ee494262b0d982a1e159451db817ef3b1ac5c4b507c0146c3ce9d39a4a
SHA51200932948056269844eea6fcd557e866228f1cb4804d1d895341b07b32797a77c3209c516a77ebe2b40584317f509a75c2036e8cbf17a7ddefe73e056fda619a0
-
Filesize
6KB
MD54238449571d5cb3e62aafcc9fba9303f
SHA1eaeceade74a11e4753c6eadbd7d82f1cf530a84c
SHA2565a6b1e71903ef6b1763387978afe9f0b68e2a5de6b39b30570acacdd197d479d
SHA512dda0a55e440640160a4ff4f59637e20173531ae83cb7e46f59ca618cdd22c2181e5528705d064aba3a4cd0ede1156d0c2ca374afb9a5bfea80dbba3410c65117
-
Filesize
5KB
MD56c21619233fab2b8f9dfb400e0bd47f4
SHA1b5bf9b60063d692f15fb14c75d64b285ee849afe
SHA25669428a7f998fef7bfad3f6aca9084f51f90022d37c2882e0e85a7cde35b9de69
SHA512a605227fa5fdb8b9645f5a3b183eb45918599f407fa21f94dcc5b4820779d46e84b0a651a431cb01779b5b05ac17217ecb55edb901145ec7c33d7233fc3bc8f9
-
Filesize
10KB
MD5562578aa11015636934153617c9477ba
SHA1d211d2424532f89d56a119a8ca49865735110a6d
SHA256a43d3c185d2c3bc5f21bdc8e77a0d644f4d3bdea6778795d775715439ee1337c
SHA512ebf8f7b056d84c3c6a18151603833278c7f2858ceb5ed84bdb453eeb660edac697f54cc094a94589e5cc438c095e2ea6acc3820076b0b46bb923c1e0407277b1