Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
fa6b5f63a145da43e14699f204f85634_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa6b5f63a145da43e14699f204f85634_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fa6b5f63a145da43e14699f204f85634_JaffaCakes118.html
-
Size
52KB
-
MD5
fa6b5f63a145da43e14699f204f85634
-
SHA1
b3bfbdf00e6af93148c2513a21639805c209a4c0
-
SHA256
d7b2e47849a115aa7fec91f064cb586e87aaf4d1b33be9cbdbb2fe84ea2aae88
-
SHA512
b980810d991266997aa77243494b699a80922c008cec8a7d7da1ddf640ed56e7ba1ee34a65464e8b14eb5311e3afa9c14b3f94e8e219eccb9616553424869889
-
SSDEEP
1536:bw5mQC0WaYmWrJ65HtG4/PFqwG8Ue/4k8st/R:+9WalWrJ65HtG4/PFqwVUk4kDt/R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 4996 msedge.exe 4996 msedge.exe 4928 identity_helper.exe 4928 identity_helper.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2256 4996 msedge.exe 82 PID 4996 wrote to memory of 2256 4996 msedge.exe 82 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 4044 4996 msedge.exe 83 PID 4996 wrote to memory of 3224 4996 msedge.exe 84 PID 4996 wrote to memory of 3224 4996 msedge.exe 84 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85 PID 4996 wrote to memory of 1040 4996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fa6b5f63a145da43e14699f204f85634_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf63346f8,0x7ffcf6334708,0x7ffcf63347182⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1148 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17110458817987967632,12298154804682615429,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD592b6780c2411bbbcd2f08bdcc82ee2b6
SHA1b59a1381fa6487a0765db16263ddec93eca488a3
SHA256013524419367d5f465022d485151d37bba861cdb090b19ef2896e269069837d3
SHA512bdf85b713bea63c66b70a5eac510ff001bbf84e4079745584599e6431e776c6ef5c432a96b2e44b64b8bf2176fa32ce22fde026a2d5ee3eedde587c2c74977ae
-
Filesize
2KB
MD50eddecd2654acace68e77517ddcfdcde
SHA1f1dd961ebaed38895d461df2ed34ee0c12dc8d57
SHA25640622506bdb31adffbba61d6f705dafa51a070676e0efe5cbbd6c5b9064b5c3e
SHA512948bab669c2ae7793b740bf3c010b6c969775b59615ad361e3f58fbebd9b099df36997808d822da6285acd2fc2988243b58f67f284da4bd956f15e24e8aba893
-
Filesize
7KB
MD54a6b76f312531b25e1ccd2f3b62f6bb2
SHA1c84768921d43e56ca5f122c6f1691b5414d64bbe
SHA256807517c9c1baa3edfd14acce0779fb483d63b10a4e3cf71a28a394068d08752e
SHA512bacdcb563a8a30e3a59f49022abd81732511bdb5f62837f6e7b897d672ded42e4679c5508b434ba7268df1dcfebf89848e00be7c59e03e911cff734180c8cc0e
-
Filesize
5KB
MD53a1478d923f4183072c3ce617cb5f627
SHA193b8a8d3feca103e1a1f19ce748b4c286208638e
SHA2565400ec0f1d72687ec9a1ef269259e36549ef2bc46225bcd1bd300ade79f27601
SHA512a95990992c02ee520b08136c2a1bb7a32af1d0d18c1e9c9830c5f2f8f1ddea4c720fb3374b5ddc3f546790c91ffa797cbb5d3de3acc61de8598e8e435c858f80
-
Filesize
7KB
MD5df49d7e6c21412e55d89f416c665e7a6
SHA1b22f7aa3bfe7d30929057884824bdd020b2f3789
SHA25663833f38c52f76ac0d34df7309ad26fec27b578773338b452462d781697de143
SHA512b55fdbf57c2a908a8091d545d9f01d236d3b242084aae8a190c232d3989c8b40fdcb15869d50b3710c25c13dab0cfe4ce85a6656a034536df0fa4b5023ca506b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD571fa6b1f6c3c6ec866e3f264d0e5fb62
SHA184fc0fca7c7e0e5c16614d96e468fdd066d2e4b1
SHA25615db2990cce5a70c03cb899acc970db175f22d131a763083fbc93b95f4aaf495
SHA51212c7f8a84040be0aa28a9bd62cba5013e39bcf7f43140bd156a450f8228c6a975d9088fd4a809e208a275a9c322985cade6f403512758c67f22784c041aa1ea9