Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
da6234b210e7f1161c0e0b8a31d7d556_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da6234b210e7f1161c0e0b8a31d7d556_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
da6234b210e7f1161c0e0b8a31d7d556_JaffaCakes118.html
-
Size
124KB
-
MD5
da6234b210e7f1161c0e0b8a31d7d556
-
SHA1
175531af48e4f898dded9cf95b64f71b0497198c
-
SHA256
972ba518dd5d493d47f3c4028ae4a9017278ab1038019fa3512d04f9fc8b77da
-
SHA512
86a007bf8c7c2b58d0418c36a8f0dc776d8f252378b2d808351d1c0b20191e22e810d68015d2d0d6fd16088f5803832f9f6bf41b73211461397566606d09ec0a
-
SSDEEP
3072:bUcjvG8rMdcXmNRSUfL9u4bar+XiyRYwrpSzXMtYiM:JrXmNRiyOmM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 1328 msedge.exe 1328 msedge.exe 3492 identity_helper.exe 3492 identity_helper.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 4356 1328 msedge.exe 83 PID 1328 wrote to memory of 4356 1328 msedge.exe 83 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4424 1328 msedge.exe 84 PID 1328 wrote to memory of 4472 1328 msedge.exe 85 PID 1328 wrote to memory of 4472 1328 msedge.exe 85 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86 PID 1328 wrote to memory of 464 1328 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\da6234b210e7f1161c0e0b8a31d7d556_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6d5146f8,0x7ffa6d514708,0x7ffa6d5147182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14421953591553844666,11396114753585323355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5552 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD502263d7b494424fd6466fc10562254d2
SHA1f4705e31c7309196a8e6e3a47b4511a9ad2bb2ee
SHA256fb7db2b88af823e179ebf5d0553a781c2bca1b3f05cad22e1478fe594303acc3
SHA512239bd9567ed3cbffebf02a370be95b6da2a1f1d6bbb2cb308233eb08ad1b2fa7a972dbbd5baef5ae528f4618382325d065081407c6cdae3e045b43911756ba87
-
Filesize
1KB
MD5a06b4b557ca8883ff392e87b3449a23c
SHA15af4ea89b8bd2699dfb8c22e75b5f254bc70841d
SHA256b83ca31f1f2d05e32e7872e6d3603695d2827e3415a596da4b38f8a6f68f668e
SHA512b955478d53d843cfbeb42e0db398c2f2caf9801178741aa384c9f8f834dd0e0afa1e1c255c548307428b081401acffc0f527b0307193082b1e1a47f3ecf3a960
-
Filesize
5KB
MD5f551bc9cc86f996458c54e966503f617
SHA1aa085c766d5928c947e4cc9445a109029f0a4890
SHA25625156a3343ff77753ad216747474213cfc29dec9eb38409a256e949fcf3b81e3
SHA5126967e36efe81ddadfe49b4ca21dac6cf450c3c070cb4e57a178d992c8836513ee70fada880c0d68329a093bde3dacc2ddd85bab903b8e2e09b5354dad1833ee8
-
Filesize
6KB
MD5545f39e3e4905538ae00a3f4c365a706
SHA10841a893cae944c434f35f5d98b3b28af58d3d93
SHA2563750fdaa5cf2717ca7a05fdc77378cd23ed32c54bd9178fe81a7ca1946922ffa
SHA5122c01d991e8a33a627ea944a4d737f2798098c3704a2e5f6a76b5feb7861c03d3f68ec56320837302e08e4a623405ddac5e55f3bdad8b97264cdffdf95759f5d7
-
Filesize
6KB
MD5fc3edc3d1c652a9047f02a3a410fad65
SHA121f543a678ef4e0a7c92bef830a1eb0a2e6f7733
SHA256b52a7aa91d843d6a5cfe0814cd71226814bea900ff892de9dc24c341eeb2b8b1
SHA5122fe7788368a4187feceb65f1df32013d39338dd5a8cf278b80e8f86c274f27171d7cbb8e0e18cb3fe5ae7b8422bed826f4440149916fca0e135c05c969745bbf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a4a20263cb3440e856536fe8eb8d4a8d
SHA13b505b2a96844961c55e9f30d5f154f1b6152d26
SHA2563578b286bb5df248d8eb275a6d9172e95055f66784a121d4b725dd9e557c680a
SHA512a56673e50f36116e9de9dc9e9d9fd06ece93875ebb4de76588c764a2ece1de1d11b1f2b5e905bdfd77fd0541797cc2b75bdd0bd6f345d3e358cbf6398940502e