Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 04:21
Behavioral task
behavioral1
Sample
fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html
-
Size
157KB
-
MD5
fe6a5c8ff1b88ab61d0082d6a5f30431
-
SHA1
1583a3390dda08153f84ba40e4dfc11ca40901df
-
SHA256
b6863d358a0d35f9b8fe5cee4c35e9ad19fdb51327276a3723b45fca15c6fa84
-
SHA512
3ad07ba077b32d8b7c59f63c1c846ebabae7cc15908ef2ed6b99abc14d7c98eb99e91d6d5ecea29eca2082570e18ac88fe3926355928558d5db611034046bd48
-
SSDEEP
3072:0XUkSw1QRYuRB7aYD/aDZ9k1MY3kBD9biUa2v/K9odxhFPzodxhXodxh+4Xg6Cn8:0XUrw1+xB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 1008 msedge.exe 1008 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3720 1008 msedge.exe 83 PID 1008 wrote to memory of 3720 1008 msedge.exe 83 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 2368 1008 msedge.exe 84 PID 1008 wrote to memory of 3116 1008 msedge.exe 85 PID 1008 wrote to memory of 3116 1008 msedge.exe 85 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86 PID 1008 wrote to memory of 992 1008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff9a4b946f8,0x7ff9a4b94708,0x7ff9a4b947182⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14132942245311948688,17893936657584206773,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD59f1fdc58f6a884d84a0c6192de9e361d
SHA13a7a04998646fda80b9934e4369566d04c3a015d
SHA256f62e3ac44d2c8f9d9578e22eb1c2d11fcbfca565e5cda62c4d130aad6ae90795
SHA51225bb6b950775e1a5aa7fd1e2e4262adabb75230cef9d99381161fdecc0c632864c03d546ff7dac647c19ad703398ff75dcf9aee2173325fb9b83fc40ab7ddec4
-
Filesize
2KB
MD5e01d7ea7b72fe9f705b8672eb5cc4168
SHA15bd91f46955bf8f2c176175158f98c1e6e28c09b
SHA256cb00c3ce43ed0f699e5ca77cb7fdb4fb63a6c9aafed41001432db5b3122b82ea
SHA512d957dfcc8d15197273304381764156f6f5f5ff8f219d6bccbe551656cfc9bfde9d902284fce4f0a0342ddfe90f7d77b636017c094dfee31d69ce0a75e5aaefce
-
Filesize
5KB
MD59be029cb8570dc3aaf278daa2d3cd780
SHA18cc979db92a099a199e5c966ef9f85e3c8afe578
SHA256279b79fa192abc61418e26086afb17b6aa3432e4967febfc81c13c3ea0a95a8b
SHA51202349d9bde49cb075c4b85a72393259ed579626ba529298bf2975ba6d04790ef0b44f7f99c1e3eed5975fd08b487fb0b8607a0dfeb13719dea6dc2c456333ce5
-
Filesize
8KB
MD5e2bd7c89c2be34372fa2965b204ff3ce
SHA1259e3b5725f101e0c02bf5274d86709f681d17db
SHA256fb32dbb3baa6db365a93c0be45c422a591cc260c02fb7acf71c2c6b6206b288e
SHA5123140ea491ebe36ba81fea4c511e2966980d2b38a0ceedbec9fe4c234815f51952799d196c5293f0ea9ac0f00bc9daab1a7baa6c19a37e2f0d21eeaab4e23b22a
-
Filesize
10KB
MD5b48f51f320a53a7063dd719683bb42ef
SHA1b65725a18fac593e1b6f1b1328043cbe6c90b759
SHA256425324bcc70a7c97f73fea7e0b0e8acfaa459d256e22e4c40d4d0b1f86d72351
SHA512ace85f6a023ea42e852f006abf787f908509a33864de312872357e6cb947b1377b3df0cd1c122b7de0d2fa8f949047f4113d1cae4d507bfd752307807c0a7709