Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
e88bd5665452a3c4c6636e628cba2add_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e88bd5665452a3c4c6636e628cba2add_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e88bd5665452a3c4c6636e628cba2add_JaffaCakes118.html
-
Size
3.5MB
-
MD5
e88bd5665452a3c4c6636e628cba2add
-
SHA1
5c7985fd052256396302a6c04bbb1b1dd61a18ed
-
SHA256
7b7dcbc8ea69558fc3cc19015c728adc0076a5e48da45be3fddce59ad92656e2
-
SHA512
d080e7b00d21c99870446b387ef412e66c81af15ba241dab0f21e3c73e23ca0a865670ddb189fce99100b2a5c38747910406b12bba401da669a4b33366156056
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6N1w:jvpjte4tT6zw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 2004 msedge.exe 2004 msedge.exe 2704 identity_helper.exe 2704 identity_helper.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3528 2004 msedge.exe 86 PID 2004 wrote to memory of 3528 2004 msedge.exe 86 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 1704 2004 msedge.exe 87 PID 2004 wrote to memory of 4196 2004 msedge.exe 88 PID 2004 wrote to memory of 4196 2004 msedge.exe 88 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89 PID 2004 wrote to memory of 3408 2004 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e88bd5665452a3c4c6636e628cba2add_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb68746f8,0x7ffcb6874708,0x7ffcb68747182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3739948872752271476,16633561339850552291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
981B
MD55e99409ae2cf3a9cdfdc6a6db8a65b5f
SHA104dfe65f73160a4f7b8951c9ef7897a3a25fea9c
SHA256a69a746291dbf64f81ddb66da20fcca83ca762b60143c799a85e996720835927
SHA512f29827b9e38f4b43418a497d0261cedc30dc8a77454d5c66d266431a72030e0985e1bc140158f93f4455dab5e3f49f5375e7f7f6bcf8f5da0f2236e7e0f9e9e7
-
Filesize
6KB
MD56ac21b236a74e7e7ea2e2f328b183abc
SHA153352eb3ab6910e0e7dc5541c0426c348b4b1933
SHA256e67163761f75ab141e9c3d1c44db5bbe45d5bc5c09e464e8acfe6f3d64f7ddad
SHA512c1aa964e0256f60a375aacec8574e178978276f623bce95884b734a69027c587394b1df66276d3619d0e1e2f67f575219aee539308b5559ea67e43cf78991d1f
-
Filesize
6KB
MD556a4269d9fd3c2fa4630ff0ce6fe1282
SHA19acec3ecf800fe1a5ed8014884e4beab18be1294
SHA256af973714a73b55d499733f12b970d94d7bb0bcecd6c44e6caed4312a77daab97
SHA5125c89b70a70626314435371294ea0add3b9eb70ecea7defaf877dd26e055582f1ee6bfa58eb0bb279649c7da8d7980793328424ad2e7e87e81cd5f0227ba385cc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5716437c7feed605cfd8dfa1453bda552
SHA1f2e66cf6a9671a7e55750959189e739cfc0a7cd8
SHA256b9f08ac148fdde18a42aeb58e90b98e2a8e728db521626265f0c1829ec1db994
SHA512de866ea2d7ac90463e680184c3cfc9d8ecd3cdb2d869483fc35abd1b378fbefea48175e50ad78f49a953e4c6bd800c52254381129b2f9fc67b8085ab7252062c