Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
dc9e4274a02a21e37155ee0c84ccea06_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc9e4274a02a21e37155ee0c84ccea06_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
dc9e4274a02a21e37155ee0c84ccea06_JaffaCakes118.html
-
Size
131KB
-
MD5
dc9e4274a02a21e37155ee0c84ccea06
-
SHA1
6b5c0f7b023e04881dd8d4d71702fa593e7f5d73
-
SHA256
bd68c19fe4dc8762aa6260570e8c6f1bea9e79c193fbc96060ed9c2e93838b0f
-
SHA512
1b98da91c699d18f6eb7bebd6a5b34c61468a8c63553c8cc28475d326aa383c49f662a355d158aad9fbb9cd2ce36b3d1ca366f57e868b1e7721b3fd89f8a2e71
-
SSDEEP
3072:v12P9imodIhMFP+7X+B7odIhLVGZkionA9j1:v8iz+n
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 4220 msedge.exe 4220 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4216 4220 msedge.exe 82 PID 4220 wrote to memory of 4216 4220 msedge.exe 82 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 1568 4220 msedge.exe 83 PID 4220 wrote to memory of 5116 4220 msedge.exe 84 PID 4220 wrote to memory of 5116 4220 msedge.exe 84 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85 PID 4220 wrote to memory of 4772 4220 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\dc9e4274a02a21e37155ee0c84ccea06_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8129e46f8,0x7ff8129e4708,0x7ff8129e47182⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5021499896888228639,1093763036800992508,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5499f9214309fe19f35b4b3b9001003e2
SHA16cc99bc035e9a39fde9f83e0b0cb258d2c4067df
SHA2560fb04dad616df90f8626f3be2b14342c2540f6d0041c4e375ee84776be5b3577
SHA51217db7c08097d7fb5bd8d996548851ed8fb50a77fe7410aeb6a6f06a27e820824f331f7bde749dead170d97a5b9c0a0678b2862d18a92cf4132a030a19168d76b
-
Filesize
1KB
MD5af680b1a21bcb6ad4cf3931ee5c143de
SHA17ba92d4baecd7ff8f845d7dac681d5776d2347b9
SHA256dc89f502cf7c3441a76cfe6ffee5072fbe20ecc4242484ac0b96a1ac0e75dd7d
SHA5125645138c83ed8f60bfe89eda37e2e965a3cd2b0582e183c5d4dc5e19251e4c827576fa79b0b1e8d2f4d1b20f4353d689ffe8f1ee294c519c9e89a06ab4081bf7
-
Filesize
5KB
MD558241c9cb1e616db1bf4762f78a04c2d
SHA1ae0a8e6ec25674710d915c31e733ca810727c640
SHA25679ef0d3cf4fa8d92903f6b61e5f6a38c18264397d04ea6c5a295a1ae73a7fc02
SHA5125d92e630bb31e241a7e532a19614d86f7758d58da0e9dedd6cbd5c525e079b12fbf781d20a98b335e685aba814167977b493b370595f62c6222f374ca7d03f03
-
Filesize
7KB
MD553b72b0b7d8d512970bc9b45b2dce54f
SHA153562941e7f6240257914aaddc9f3508a7121cb3
SHA256496e86ba030877e92d3b2d253cd691f686384a17ef2c9b4c9b9cdb0b3ef802bb
SHA51271ed3ef0b952d174573d9b0de1f8c9fcb865fc8bfead377290f8a345c326b8c6af28b02788e92d1c710be1978296270b6fbf75cd6c36145c639148c7892b1e52
-
Filesize
10KB
MD5249abb55644d98e1f73c68259de799b4
SHA13b4ed0e6d8569b273388941e296b87e0f62bac9e
SHA2560a8708194fc62f714a6788176f95f8559bb6a6afa55c9ee3a14ddd296460136f
SHA51227ba11e752f6350ceafac6427a3365f5f533333eea292a16042e7c91b9296bcd1c26ed76598f814d780a54c135633799d92c2b99c56a1990b4118736b14c928c