Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
d4b10f674efb5c1bfac20f8b1e1075bf_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d4b10f674efb5c1bfac20f8b1e1075bf_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d4b10f674efb5c1bfac20f8b1e1075bf_JaffaCakes118.html
-
Size
76KB
-
MD5
d4b10f674efb5c1bfac20f8b1e1075bf
-
SHA1
e82570552e4deb7056d4a83f0556c061d0a860b0
-
SHA256
46436d1270ed10570353c6029133cc91850c9c75e5f021b039b3335b1020f1cf
-
SHA512
c9d8a41f38f8af17c53495d7144c4102d2588fbfeb90150364529fa77e47fb79ded5e8083d5db07b9fd170ddc8c0d07ec8d927aa848d51041dd4b1b8e1028500
-
SSDEEP
1536:CBegMLnVXkIkIkIkIkIkIkIkIkIkIkIkIkIkwkwkwkwkwkwkwkwkwkwkwkFVklek:cMLVEkl2QEdrO7OQlb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 540 msedge.exe 540 msedge.exe 4632 identity_helper.exe 4632 identity_helper.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe 540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 2620 540 msedge.exe 83 PID 540 wrote to memory of 2620 540 msedge.exe 83 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 1388 540 msedge.exe 84 PID 540 wrote to memory of 4588 540 msedge.exe 85 PID 540 wrote to memory of 4588 540 msedge.exe 85 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86 PID 540 wrote to memory of 4440 540 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d4b10f674efb5c1bfac20f8b1e1075bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95bb446f8,0x7ff95bb44708,0x7ff95bb447182⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,14474098918239843729,9135339907937375722,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD50ab6a007d62de71b724d15839668268e
SHA15759d48595549654e818bb9d79b1edc33d06b130
SHA2562decf857526c26a8b71e72ae577ccc5f84693d43203052eabf4b0e3709965722
SHA5126bbfaf1106027a5343f35ed2d7967c60752ccf62c0dd8ec46e2e84f404c335cd98ea6acb5f37135f32c7e3b5c8348f922110a7c7bce81f24df8df314407e5430
-
Filesize
1KB
MD50f256a532dc51bb36501246795b40b11
SHA1d9507ca83f504c9047c1d8d4ebd739e58f6f2fd6
SHA256e7fa2ad84760a895bf206dc3666fb35f5c4bc46650bb13834d564fff53a65654
SHA512dddf538b62a2ce69d9950cce6fad94f61ba33955b340b8d2b388f3b4e3fc3d2572205a3139633d579dcec161feb812b02a7fd120aa759107c7afbbef61949e20
-
Filesize
6KB
MD506937eced1a3b537e4abad124ed32a4d
SHA16ef6e3ecc5fe3ac9f78797f3a77d3d60ae3ab342
SHA256ed8d6bf2aa55b7440a1125153a6229beaa097a6cafa7f9df11d664ec25338b9a
SHA512c26028a1af9732efd0babdf8a9e2f41c02c9ad40563ef24e3976da20dbaa509038dd15a2698fdd703115324b550dce807d0e0cc139936949e7d94ec9829baccb
-
Filesize
5KB
MD59dc947a7e14da70258c2ce5c2f106660
SHA14802ccdb31d0e883b573125717655dfd98211fab
SHA256808b92cd7200d2c2793d57205828bb7935a7897026ee89a5c80ccaa38a38fff3
SHA51213d6bc63e1bc54a87bc0350e10d189556451305bf8751096af4b2d12fedb0c0a9b9ad94b36bd2b861f07d390138d4ff1418f125e977355ccde7ead5dd29fcf86
-
Filesize
6KB
MD525a6dd00c6f2c67671d1ed86f45a69ea
SHA1f2cc2b151173fff6b07ea3ec693658919e3b9c84
SHA256a4d8ac2ea0fcddccad70b01d04b6a0e7ba7ae107ea0b728a603ed617abfd099a
SHA51221205dbbbd47153e419e412aa0d724a283a8862547b41e5a10ca16f56d408ff29df4a13050c4c336ba68b3917309b0d179e0e31af60c41a7afefc495a3713d1f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f92762ab7d8f82b26258e958f1e94306
SHA1d49c0bf4856da5efaad652cef3bed510d933f05e
SHA2569aaa736a01999e154c578525b89eda87382417d066196065c196e9b3f0db4473
SHA5128cc422397e3ace3586d5dcedca89cefac19f3629894e95b78abd21f2ab03ceb035b793df587b193a62606be4891747969aa0c3d98a685e624996ee173991605d