Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
e8aa813c132f6e5d8b4916d27978cb69_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8aa813c132f6e5d8b4916d27978cb69_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e8aa813c132f6e5d8b4916d27978cb69_JaffaCakes118.html
-
Size
1KB
-
MD5
e8aa813c132f6e5d8b4916d27978cb69
-
SHA1
5bbc74e67d6ce73d669836ab83f609c5366be5e1
-
SHA256
4dc934ad786cd8a93cdd119355e524c1fdb5e7455b577f5d1ad09249a1484ee6
-
SHA512
4f4db50e3d841d73591141e3242794a220660b954e7d34e9ce4d803b8059a093d79d1a83cf3c1df7caa77e104c328baf003672056cedbb175e8fef5f6a34fc2f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3604 msedge.exe 3604 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1948 3604 msedge.exe 85 PID 3604 wrote to memory of 1948 3604 msedge.exe 85 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 740 3604 msedge.exe 86 PID 3604 wrote to memory of 3332 3604 msedge.exe 87 PID 3604 wrote to memory of 3332 3604 msedge.exe 87 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88 PID 3604 wrote to memory of 2344 3604 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e8aa813c132f6e5d8b4916d27978cb69_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8639d46f8,0x7ff8639d4708,0x7ff8639d47182⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,18002035153747702363,5158832846352121578,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD5aa4b041890244d9eafffe49a0c1a7a81
SHA1487b66210e86e31efc80c0109547df0357ff4948
SHA256843cd5d2ff5eb5d68a91484e1c268ab021060cbc34826f41a56f4392448ed1da
SHA51226342d3d6aad7a7f3513b300d67051401042d5a58938dfc7c5a2dac80e74d7612fe680aab731236845e1022c968cfe682712b22f073233d98eec8b4cd3507541
-
Filesize
6KB
MD514955ff0f8c270ed5ea2a518b6817b58
SHA1fc8da44a9e2f9fd29efe96f8d69fca6787f5b934
SHA256570f0ef56725f498a324be1814dee7ff05d6da6b725a3db0970eadd8c9b8fcd4
SHA51239558f90c960d65f347c89c377886e07fb02f7358b1534a21328f26da479ec31a28d4ea7090ab374852c25e5679e5854d3a3c6419e5d5269ec53ce68e9625fb3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e0da652f4896cb93e7ff0f4f2bc72ab7
SHA12c4276031c44ec9ddc494f52eacc4b6f3eb07585
SHA2566f45ad83cd20593f5fc789c2bcd07bb1857587d4d055bb91eb6b85daef7ddd27
SHA512feb2317875742d1adfd12b5cc23296ed5bd8efc6c8b586b7d7f62434f4c94e897c90155da3b4ed17c96655e33a971105d171d9595dbe564edf48235d8499f402