Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
e13a95637fcfa48042d9bbc81d9b2c1d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e13a95637fcfa48042d9bbc81d9b2c1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e13a95637fcfa48042d9bbc81d9b2c1d_JaffaCakes118.html
-
Size
40KB
-
MD5
e13a95637fcfa48042d9bbc81d9b2c1d
-
SHA1
1b11f2b9d534f357e2a19880acd05585939265cf
-
SHA256
ac35416d51b2de28712542eb33122f23135c4f4d1ef33389a9ea9450952c4073
-
SHA512
e05adaf30e262fc64afebba912df8c1ec5adb38bd31a60991b421b22660a416d2ae552af810bd7b4d25621cf43f8921261b15f415f91b623437eedd27dd3d337
-
SSDEEP
384:SyOGbTD0/egXqkjbQbmK65fjklL5tVibjMVCHWZGoVQ6AVWX2VVpEVpHWmKVSLV0:STYP02Eql6ely3j2HUO4DQSfegH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 552 msedge.exe 552 msedge.exe 4256 msedge.exe 4256 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 3536 4256 msedge.exe 83 PID 4256 wrote to memory of 3536 4256 msedge.exe 83 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 4700 4256 msedge.exe 84 PID 4256 wrote to memory of 552 4256 msedge.exe 85 PID 4256 wrote to memory of 552 4256 msedge.exe 85 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86 PID 4256 wrote to memory of 2708 4256 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e13a95637fcfa48042d9bbc81d9b2c1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8964d46f8,0x7ff8964d4708,0x7ff8964d47182⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8511149401868481608,5130673209682244752,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,8511149401868481608,5130673209682244752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,8511149401868481608,5130673209682244752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8511149401868481608,5130673209682244752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8511149401868481608,5130673209682244752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8511149401868481608,5130673209682244752,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD57da07decdc04cd4fe375f8fd4db2332d
SHA1ceb13bd356ee292e6e770e91b0014f4aa772a10b
SHA256f2d4136a6b211e88ec26d31d4d6fba4e6feeadada043ba6f40c8b0fe850fdd6a
SHA5122a60d53fc51bd94f3503c0fedc272b0f39bda0d8683e134b3932691f3d200101981238eeac454ae14c7d9edd195fa383a43d4d71344a083f4a311d14facae973
-
Filesize
6KB
MD5d8da38c89d5bfcf5e6e937f01b6f85ce
SHA15e235ab836e85727171e0109a180f542802b218b
SHA256f8930bff2e597388a03444c232e252e7272811aa607fc0e71c220186c9f8efe2
SHA51261ba1309cc2ef717aa5189897edcba4e292d17d545e926cc5d24b2f2b51a38eb17948d706294e70f398861838014000277a86409e903296e203684105bc34c87
-
Filesize
10KB
MD54ccc6dccee03edcb28ab61305609f721
SHA1084f756505cf35ce7b2f2fd1497af272cdcd5ee2
SHA256dfa247d3a4375257fb7c5c45e8495d9338c39ee866f379f4d684bc6eb2735580
SHA512793d6a5b4fcbf4fbcbdf76e86d8c1be12b8289eb6d397cbb869d7bb17ce96f0c24793a8477c83178ed6e7d2aea01412c3f03089422a066cb640909dd7cfb70e5