Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
ef8c489aa69327094f8a8508af065451_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef8c489aa69327094f8a8508af065451_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ef8c489aa69327094f8a8508af065451_JaffaCakes118.html
-
Size
213KB
-
MD5
ef8c489aa69327094f8a8508af065451
-
SHA1
76594cb1de203e299f9cd516743a6befbc0f52c8
-
SHA256
dd5b4ab215e44263b79618777042999101fff36b954a987152d94679c6e8fc23
-
SHA512
4b323933367470a944c814cdb481b8ff19814392d54611b8f44e5b1f73ba1100b5c5fe6aa2a4fe45a98d6629ec58cbf94a61b269e85c88dd09654283e571c5be
-
SSDEEP
1536:wuztRWw2ycRMCuEaYSH1MQabuYqE2fJ6O1T0imehZQ5yaeELuKdBT:wuzrxaRp0YSH1MzbuYqE2fJ6M7kPuKbT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 4496 msedge.exe 4496 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4948 4496 msedge.exe 83 PID 4496 wrote to memory of 4948 4496 msedge.exe 83 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2024 4496 msedge.exe 84 PID 4496 wrote to memory of 2604 4496 msedge.exe 85 PID 4496 wrote to memory of 2604 4496 msedge.exe 85 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86 PID 4496 wrote to memory of 1648 4496 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ef8c489aa69327094f8a8508af065451_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xbc,0x108,0x7ff8bb5446f8,0x7ff8bb544708,0x7ff8bb5447182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,942400955952365052,3342154232126106346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD522362bfdbb2b425cd6e64cb4736e1093
SHA1cc17b66c0700967c6810f9f8554e0c09402a69c5
SHA2564a5dc44b2990b180a88203c117d5027f2ae7dab0394c40c3ee1d373b76a89c53
SHA51248ed67f94e139b946905fd3f76f22bbab2a3d13c2a8ed9bddf656e86956b5aaff80b56c06962f274da9b4c0b0effe3bbb8e3af98515abdacc8484750259be11b
-
Filesize
2KB
MD578c6ef63070cfffca5a86333e3c1b736
SHA1fcd6d885b6e7b6459a4546b9d5a76fb6c47d119b
SHA2560e92488ec2a826dc78a5bf82620fe9c4ae1c0cac3184ca1dad3f4677df5cb2a2
SHA512736eb8d69c9ff50c8b95f6870c9b6772db1274e99675f6ec8d9f0036d798d3d74e2e4c50d87055077e07fea7ab3d02c9e2d1d03a0b570ed6f77f6f523ce3272b
-
Filesize
5KB
MD533196a95961bb977feeb85618f0d88bd
SHA1ed15ba5c401684520a1362f0b8b8147967df3945
SHA25606a6ab72fb4f8c1dc955e59b7acc1c3c29e23e1c64f4d5ae9ab32bf37abaaed4
SHA5125c583b65609073d8250cf2e69d630e915a61b918ef2a4eeaae34eefbc1fa4e401996bc168cf87ae301e35705b6feacac4a4b9d7e20f1d614ea029424a3d224a4
-
Filesize
7KB
MD5f254795aae65629bc505ce38cae795a9
SHA10b869a630e58e563d2af0c664980ff5594d5ccae
SHA256195854f1f4ec69d0364c7851bcfb1b6b89f96509dca99b490c57a1e42720f992
SHA512bb53a72f1b76e0fba81ef559acf9ede35c70d02a61ff3c1d76e902c4bb33c844b83bb7efe85270cddeafe5f3783c30f76d3083610cff130e298942cd326d4141
-
Filesize
10KB
MD5785cdc93e0ad32d6f1e90b124111c732
SHA14e9997709e7cb69951f1363b38633a527d8ec8b5
SHA25631956d55e8f47fe89c9277fcac57d1e881139faa16b7f4a4291f8ded1cba03ef
SHA51224a8d8aad885e21fd59192d87b7532ac98afb6cb9454ed028faadd1a24ad6224c81e556f1e94b42244c8e870c99d2e43b4a09df09603d5c2e43b768fec471b87