Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
d3d2f66829899f0a1c57f989993fe9e6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d2f66829899f0a1c57f989993fe9e6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d3d2f66829899f0a1c57f989993fe9e6_JaffaCakes118.html
-
Size
203KB
-
MD5
d3d2f66829899f0a1c57f989993fe9e6
-
SHA1
501cd399a558e1096d643a5cc086dc817036bae6
-
SHA256
752e1cb32ccb3eae2a3342fb0bb69382155b737353c74872f8d37de8a45c7f29
-
SHA512
01606673efa7dad89c5dccc25a4626183dcc540499b2afcf7e6ddfeadba08f1316100ffaae86f6250108b066c568809efdc4768ba81634b214e763401fc7fc87
-
SSDEEP
1536:WuztRWw2yuqlLaXuYqE2fJ6C1T0ime5ZQ5yaeELuKdBj:WuzrxUXuYqE2fJ6QrkPuKbj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe 972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3864 wrote to memory of 2792 3864 msedge.exe 84 PID 3864 wrote to memory of 2792 3864 msedge.exe 84 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 2144 3864 msedge.exe 85 PID 3864 wrote to memory of 1096 3864 msedge.exe 86 PID 3864 wrote to memory of 1096 3864 msedge.exe 86 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87 PID 3864 wrote to memory of 1260 3864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d3d2f66829899f0a1c57f989993fe9e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc8646f8,0x7ffcfc864708,0x7ffcfc8647182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13933221788959828482,12554982952938315998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD586ea5774eafd95ade9416ba0bc165301
SHA180b31c9ad998f503ebb6ef73f5693f8ffe1dfed1
SHA256b7336fea019d357df33ef16dc83f7feff9c4a75e4529a00477bc21bd80ec9b59
SHA512f37cb8f315f50a9180a6dd784585762a0e5647104172957536608300441bb0faf93e5d1dc78c3d6cf9e163ec164b3d9f6b16c4fddbff6a8766a8698a1e06d1cb
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD512999c30bc36d101291190f8f4e15541
SHA1ebf55363f1a093f854f478fc346fdd8541e46428
SHA256b1eece22cdb5c6ffbf88bd91e61e0f1cd0c9c5fcf8c80ddd5a69723238c218e9
SHA512b77e0e37a52340b50734812bcaa51a373192ab2eec0931a4fa6d780aa30eb8bd1d51830a5bfaf871ac8c126265b43714929b04f234b297e2467e2e45d98fe25b
-
Filesize
5KB
MD59b5db41f23a5125b04219312d0fca965
SHA17b8f03a2af372f449ddbec38a01be75722a90f4e
SHA256b51cee7f4424d0d88d92046bfeb6aa37af9a78004a3585fb10c8bb699bc3e549
SHA5123ada7ae341e6bcf3e7c798eda8585995214386e33863ddb484f6b9eacb06d1a04422d1f17fde570f65a0664777d83bb6cdaf04f34942d63ff86bd0e0bd690245
-
Filesize
7KB
MD5fb86d81c886226ff990c7aa6154dc16a
SHA1d01e7c42afb547799a644e5106fa0be3ddb9f61f
SHA256bea9f2399c73d7291ad94fcf6c622059e5ec8b47908b68c9c8d9a6247a4c5cfa
SHA512fb6da10206a7203ade9ce32b716265149518709c34002230a7a7e7a67fb88089b3d432cd4afb517e6934e31ab84a3691d8841e9f50447d62035eb8fff21060c8
-
Filesize
10KB
MD5f7b1873613e8c605342dfb88e8e90608
SHA19e4879fecc4fec2ee2f33263e9c65a795cf440a0
SHA2566a9b60fd40f5c3c15f402addf5fdf4f99071ab7c978d0e12e248ba7a9a0a21b5
SHA51205e50435452c28014d2cd701f972b8c5fe02b2b0757c60aacec2ac796f8af4c631e1f8fe126dad73236959e0a66e00dfef5b8f214cd63bd1134d2eb3f6194237