Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
e77af1f9a5bf2aeb99639ed5b4af49ef_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e77af1f9a5bf2aeb99639ed5b4af49ef_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e77af1f9a5bf2aeb99639ed5b4af49ef_JaffaCakes118.html
-
Size
3.5MB
-
MD5
e77af1f9a5bf2aeb99639ed5b4af49ef
-
SHA1
9fba2478dd903fe00537751fa10a84dea893e8da
-
SHA256
e1d3f127d13d25636b18a2101d167baca157c1bdfd1bf435017c2cc7f27555c8
-
SHA512
e49dd0847e123a1d5d5c4a4c9a5882932f5c9ea798d14edb2dce02f10f97859c9e9973058636d0e87890033213c2b813b386e478cab7b8e695d72694cba48ebe
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NSR:jvpjte4tT64R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 4124 msedge.exe 4124 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4456 4124 msedge.exe 85 PID 4124 wrote to memory of 4456 4124 msedge.exe 85 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3540 4124 msedge.exe 86 PID 4124 wrote to memory of 3924 4124 msedge.exe 87 PID 4124 wrote to memory of 3924 4124 msedge.exe 87 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88 PID 4124 wrote to memory of 3588 4124 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e77af1f9a5bf2aeb99639ed5b4af49ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf5c646f8,0x7ffcf5c64708,0x7ffcf5c647182⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6133848915074821686,8361042949817317396,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
981B
MD56b138f6d8aa2d90af76148bb9f857fe6
SHA1f6ce67cb876e0269152c156fc2913d75b7675915
SHA25694465b43d689c954ae91909020ddf1de7fba329525ae38d5d1146723524c8ca8
SHA512d26e297df186cf1fc048fc859f96bd65a0d0e6cc35eebf4955f6cd71942c19a7ec69750146132ab9bb55dc71e09c1608fc83039c318c29afa7bb7b6d1a945012
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a5ae608fb314771065a0413265912707
SHA1f2dc653d99ba658c0464e0628a5dd34353aaae81
SHA25613548e67de37e4cc923e65802a14ef4bf32aa88ca6ed68f6eac8cb1e1b0f587c
SHA51267466c2711df4e4d862b53d7a858b2c9902caa8290da7d23121216cf39024414d45c7d45545eefcd182993fb6e9d9e991deed397d12e6b289b7801801e23e5cb
-
Filesize
6KB
MD54b7f1bbc17f43ccd176af9eec2ee1dca
SHA1d91f86aef6a584ae9c2a75e79e85af5a91ace82b
SHA25675f5a5a217da03641d8959c005585783f34c24bb7ee7c14e24f7e87151e59752
SHA5123a560df29b7efed5c9cbd911dd5675b14b477f305e4584687d854cb2beee780fd36e0947b1c4d34eeec9d400134d05291cf413b648968642e069383eff9a0a77
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54f383e9ec2461d8fae74fd4728814d31
SHA13a21979b3032f89e11178c09d79cc20819fd4631
SHA2561e66531f8bb6efae8940963dd77a26ef6f61c09c5287d79dcb878ef661a0f291
SHA512a2edb9629799f0845f6cd55694941d9bbd0296293f77436c0b98b5345d375568b3940400080a4223e8e08b3448b2fcd00b886e1102822fc99954b297c33dc797