Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
def7168d20c0ad5c39324a1ca2976285_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
def7168d20c0ad5c39324a1ca2976285_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
def7168d20c0ad5c39324a1ca2976285_JaffaCakes118.html
-
Size
30KB
-
MD5
def7168d20c0ad5c39324a1ca2976285
-
SHA1
4ef9a2add533b7397cae9f319e7ddca25fa9f04c
-
SHA256
a4adab7cf5459a859013000cb429a91ff5742e8b7c32542598687498c49ee48c
-
SHA512
1cd02aa57b591d9823fb3e4de3d90a017c6ca435da48b53e3e383ca659588c221388c736fb2089c231757679b98c6058c8c72254b30f584beaa2b9cc7337dfd2
-
SSDEEP
768:SR1tSWxlA/2ULylXhcBk3l8U4zZxHKXrT:SR1tSWxlA/2UylXhcBk3l8U4zZxHK7T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 744 msedge.exe 744 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 3464 744 msedge.exe 83 PID 744 wrote to memory of 3464 744 msedge.exe 83 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 1088 744 msedge.exe 84 PID 744 wrote to memory of 4624 744 msedge.exe 85 PID 744 wrote to memory of 4624 744 msedge.exe 85 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86 PID 744 wrote to memory of 3100 744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\def7168d20c0ad5c39324a1ca2976285_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b7e846f8,0x7ff8b7e84708,0x7ff8b7e847182⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,11991412403687137916,5902993665575544097,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58e2980ddff1dff0240ec6e78861281f1
SHA188a3b2ded3d4962383fa91544b3e171cb80985e9
SHA256a9b4b5e5f3fd0a909e395828fc76f8558138f61cc764f6a50e66b9fb2c5ea9fc
SHA5120164fa9025e51a2182cd430176ab886a3f30e19ea4f7088e9c13f4b673682c74b297601e20d84dcf7fb2e1659d49a889e77ed5fc8943818aafb33ee5e61992d2
-
Filesize
1KB
MD544f04d9defdf68bb01ff4f48271ad9f0
SHA1f73162290c31913fbccdd98e3e4bbbc7ffb0a1cb
SHA256a288137ebfd3961fea1be311465960d099943299994cd3c7de194b08a6d72d45
SHA5125b3e67f75346a52da609d0a392c558e040b8208a102a094bf8ef51fa8206e7b946cd8fcc9957662a0409f08922ddedb6f19d33ab0c2c6ca5c7db6d0910d4db20
-
Filesize
5KB
MD5973a918934a8e1ca2c8d9f8a5aa45982
SHA18b3c9bf4c74de706d82b4f6acc7aae9f4254d927
SHA256a57dee7c920b27b6f3769d953cf39709fc68efeb0bc4983e9aa542e45a89e8b4
SHA512a03dc804704c55b5aac6a5c0b717d241d5cc0d2c3f2bd5ce0e20d8f6da478503e4b8eb80bfcf739b648dfe0e0e6439c96311370dbfd0ef775bf092b198b9b8de
-
Filesize
7KB
MD5734891b691ffabdf6e83dc281259900c
SHA1a2528bcb93fd4149b3be44d6acba6b1739fb39f2
SHA2562791e51b3fba2a833dd7a027df81c62fb0987ea84414b3a2d65525d9b22fffbe
SHA512cb451f78aca3c7d49115683848d8e34c793796d36ef58c55e5ddc411c1fc9edede0cd28c8e54098bcb3151168bfc817d63217ce2950f83270f7183d3ae00ff82
-
Filesize
535B
MD578decb9b57941ff3949440bad65a0cfb
SHA1d5c9aa3440a7857dc297507732538d83f1e9d1dc
SHA256a431526fea4e6ea67456ad39047f71b66584248c829e1e5dccb37f2c1cf7774d
SHA5125c8054ee4ca98d2344cbbc52eb67a645dc2854218e28c0165a332771950516308a617071b35bdbf3c140a4bd6d8bf476a5666359559f0548b6d4e031e58d7e6a
-
Filesize
370B
MD532c447c268a9bb9090e99cfb715ef257
SHA1ddb915756649d4dfa4a542c6be0a879079c5afe3
SHA256080fd99efddcb9c739da6c8e1dbd81bf738765f38492f9ddfac5626fe8cdaebd
SHA512e7d84fb875af6c3a06d5bf845bb6bab316a553dea9d0bb7b3646569e13cbbad1ef470b0fde6e23b73c72887ee8a3463ad5d4c603da05d395dd3268db528552d5
-
Filesize
10KB
MD5016e8ef78ef61ff33edb44e2c4c547a0
SHA110159bc0e4887f408c332d22a11d9c3fead0c776
SHA256fd52083e77b0dbf9ae19a044f0167e5f5dd3c40c42000da45225f871fcb6caa6
SHA5125f02fee75c9e29fcffcffc1e959fc840c24137577db692e510435108028f71b24852846e80a4bbffa7d0423e39fdfede50f5c8c55a72a275b2abe94b80dab281