Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html
-
Size
9KB
-
MD5
e012790ea6bcc6ba6fa7f5853ee3a2f3
-
SHA1
56f42c7bc4b6ee9b4f90641bb64faf01c261255d
-
SHA256
c379c002cc3032c6e6d29ea50dcf8217d37b7eb94c7fc12c73abc68320c2de13
-
SHA512
d659cf416a23f10082dfbc3855ce6901a990d5a881f296e9fe0e7e5efc9ecc3ee9abeef7cf41709f9c1874e44d1c88edbf920bf3bc6a083734ee2156f66e3c5d
-
SSDEEP
192:MrZLbg9BMfgY1b65Pwb2JOIwHyGW8oiPNdsxs30:6bcwbuOIwSG7oiPNdsl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 2848 msedge.exe 2848 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4008 2848 msedge.exe 83 PID 2848 wrote to memory of 4008 2848 msedge.exe 83 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3508 2848 msedge.exe 84 PID 2848 wrote to memory of 3724 2848 msedge.exe 85 PID 2848 wrote to memory of 3724 2848 msedge.exe 85 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86 PID 2848 wrote to memory of 3152 2848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8aded46f8,0x7ff8aded4708,0x7ff8aded47182⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,853727810821266358,3533743724333607817,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
194B
MD5a55e88abb839401a55a5d2eace9f52cd
SHA1be3f3ba6821ff9d32177e964afc0f050cc2b7e30
SHA256a8c6324d5788deb7d5ea9912360f5a37da8ea5f3eb4f548a4ac9c428b9b0a78b
SHA51276d352a88507a3b3897394802d5bb2385a67966781527d455e3f20fa47742120a5c4d42ce5b9eb020a56d5068209c3a2f78804625f79d6fcd2ee3d1767a7644a
-
Filesize
5KB
MD5b434120adf4446c13ed8647fc467277c
SHA1ce5489c5750ab36eebcb54e99a5aef1efd41cf83
SHA2566d0e1b5f8dfd092068461efbfaac3f84e86049b11ff19e0a64cc215516dd81e7
SHA5129df3ec42b62df30056d0ebba819c9b5675a4c61cccac2fa92bc6f463832d25d7c8eb9f18af58a858c81b3c61c71b1cb3d1ce6c5ad0a48a366a4848b4a4283880
-
Filesize
6KB
MD5fbf621882918891f3b3b7ca3fbfea2dd
SHA1ed9765d4bdd93d88c701aa4251b97dbf6fd25585
SHA25666be1924622fb5536ab926762f1aa071599084fd774bd808d3b3d4ae31909496
SHA5127bf74fcf9e42079e498e4ff9b8c4d116b4fb7427092eeeb35c83e2c7bedf8cd6213ce3ec8bc16aa7daa747827b626c6bc1594ea79a9da9618d4d3edbb98efad2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dac9c0e76e12b621da679dbef1ff8b65
SHA10d3489361c1f3dbe923a9a927961b2c4e0e10488
SHA2566e45116473036f972fc36918a3e91b32d5f7846d186de5e5f5ceb07e3e7c1278
SHA51253c2bfaee030d6ba2bdffa44045822aff00087d9f282ecbdbea79e91ca05cb98fc2605433e38e4bab3e2355481f9e14e96fb305daaa77c995d97c7c8b205e9b3