Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
e2c2878ac643417bb3f7d8e899bb6c98_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2c2878ac643417bb3f7d8e899bb6c98_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e2c2878ac643417bb3f7d8e899bb6c98_JaffaCakes118.html
-
Size
15KB
-
MD5
e2c2878ac643417bb3f7d8e899bb6c98
-
SHA1
7ac21fedce840949d3395c2bc2f794bc777af0bf
-
SHA256
e29070341ed327859ea8fb01ae135d0d66d32b6f4c01108586ecc5a39b31f905
-
SHA512
23165a8ccc06e2e4fa94fd076d7c666d2980e7b6e3fd2128f1740f68b24ba1674505b48134179dea5bfdf00f243f0673e1659e02e6a7236528019aa7a83755d2
-
SSDEEP
384:4WTj3pSdfEfE5MEOldVH6hzM0NOfcrafOhnWBCghd+wRzdApU4JDo:4WTjiyqJDo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 2852 msedge.exe 2852 msedge.exe 396 identity_helper.exe 396 identity_helper.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4748 2852 msedge.exe 85 PID 2852 wrote to memory of 4748 2852 msedge.exe 85 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 1348 2852 msedge.exe 86 PID 2852 wrote to memory of 4840 2852 msedge.exe 87 PID 2852 wrote to memory of 4840 2852 msedge.exe 87 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88 PID 2852 wrote to memory of 2996 2852 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e2c2878ac643417bb3f7d8e899bb6c98_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd532e46f8,0x7ffd532e4708,0x7ffd532e47182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3084 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4627988284995198266,17952931645630391556,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
332B
MD594f652fa3b49732d9eba246126f64e01
SHA147902b574d535f38a133bebfae0c989a659d2d75
SHA2561c36e7edb33fcfaf60795b38e9e5ff893ff0734684614ce69afcc0af943a947b
SHA51281e05eb9eb80297e577f1403b2d3fd9607c5dea6769fdf7923e9d514c4f2d3d7feaaf1657d3dbeb7dff22b466db994571d5aa89d5709ea8cb3db8dc67c780385
-
Filesize
6KB
MD57339a8a8f19a190f4b210e19f458d3e3
SHA14ad8a474bbbaa45b2f9cb628887ff2cd75cbf159
SHA256f8ca25e034fbca01c00115bda12056009391ab4d3ad557f0d7ed3acf4c73e532
SHA5123d633892af0ab21853bd1624d70aee6643f9ebe6d4a3c8608baae2cf45e5c8488ca785a0561d778b994c40206e65fdd16799a575be58c09bf9d7ff03a6eee131
-
Filesize
6KB
MD52b50fcee8e20faa4ddb5c3a2f3688fab
SHA1b554f2256bbc03374915d51a29eccd2f93f7c3d0
SHA256d6805ced4883247b472c20f6badaac68a86ff098270956dbe718ca1f3e835b92
SHA51226324592a1d54e501a1413df96380d0d94b68e034a7015c916e675eb767432d33521ece318ac0900d93b056033c4391b007b3010b17df09fad030b7e2fc673b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD534bc8c9a7c5d8c08277548a2d7257177
SHA1812a26b6927e65b3b4bb631bf53c560df31ecde9
SHA25668f718d0786649e9bdaa66c73f001b5e43e7d25556bb95f675c8f56e6988ac9d
SHA5125ec72aaf44b0294024686a2eab47b5c3f2f41b823cfe637371534430fd338f77590f1745f331bb3037b53c175832043e6fa23afe6037cd28e8bc0a8c96943b9f