Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
e12c094e0149b1e441c306d862d46431_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e12c094e0149b1e441c306d862d46431_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e12c094e0149b1e441c306d862d46431_JaffaCakes118.html
-
Size
69KB
-
MD5
e12c094e0149b1e441c306d862d46431
-
SHA1
35aa03161581e4da5aab18d0414fda203f675a64
-
SHA256
855a250188ca0702abfc69c098dd8edd9e96f9ce0303d5c4046de212036918b2
-
SHA512
674faccb77274825b43d0e3b89f034a09e670710e241bff1ce64f40ceef042d59c2875bd12156f911968b00e3534c525916c4f6a894f9831b85c4773f144de33
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sJ6I1HNoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J3CTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 2360 msedge.exe 2360 msedge.exe 208 identity_helper.exe 208 identity_helper.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1920 2360 msedge.exe 83 PID 2360 wrote to memory of 1920 2360 msedge.exe 83 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1704 2360 msedge.exe 84 PID 2360 wrote to memory of 1528 2360 msedge.exe 85 PID 2360 wrote to memory of 1528 2360 msedge.exe 85 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86 PID 2360 wrote to memory of 1576 2360 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e12c094e0149b1e441c306d862d46431_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed34f46f8,0x7ffed34f4708,0x7ffed34f47182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12719234500980333618,6134554550779220242,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5e54a691cf49a129d79fb790733d2cbff
SHA186e7ba2b78c993b6eed34e85a424693908bd27e0
SHA2562b24aaf6dcdf58e1837f8bd7be20ee531c927f85be889c2ae8f0fe55a1f86bdf
SHA51244765e3b71c86ccd9a502943eba97529f0350a61054ff0adf220f3bbf138913917c89541a317449a8e10e6c1dc7266721551b35e292aea1a6f2619c29431d09e
-
Filesize
6KB
MD53509762563423599550c51db0ba251c1
SHA10df2e4b918bee47a7354bf4e429644b5ebd4909a
SHA2565f622caa7634d7d63a9a455706b9dcfb221108b1ff6142573b1f49a2d34bf834
SHA51226b08aed2c01edfe312131a1121422eaa921872431785cf9c03e1946b1c94957301f1a3719ea1b42c321425a95679b7e22f312386f689dd08affedc3f0a322ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cd72c3535e48097c5ad54220b98f6073
SHA13743866dc3fdab51b98d3e47031de19c15418c08
SHA2561df886df3aa645a6aeac23b686f6a1da88ccf8b048a78e5c91129b8987eddfc9
SHA5123f592e56ce19749c28817786b000906e1a578d7ac5ee4bb444840749ee07fcc8f89b214b3e5258b5f4fb83c8b0357945f2acb4372e30165b7112b51360df9780