Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
e030a8a239daf3094bf5c8f92f9bd182_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e030a8a239daf3094bf5c8f92f9bd182_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e030a8a239daf3094bf5c8f92f9bd182_JaffaCakes118.html
-
Size
43KB
-
MD5
e030a8a239daf3094bf5c8f92f9bd182
-
SHA1
08728c94c1329057db50088a7997f11cb3c01ce6
-
SHA256
1cccef7e5abcd3b180c4717a24caaead68b2fa382866a15af59dbcf7e102cef0
-
SHA512
f185705d545dd6477f72e7f11fafe2a1b9d1f1d5675925c72741b1f22893760978739226497a95f62ee87720dc316499a539cfbfa5d47102fea215f7476d4748
-
SSDEEP
768:vIRIOITIwIgI8KZgNDhIwIGI5ILJ7SOIRIOITIwIgI9KZgNDJIwIGI5IGJ7SD11h:vIRIOITIwIgI8KZgNDhIwIGI5ILJ7SOG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 1576 msedge.exe 1576 msedge.exe 896 identity_helper.exe 896 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 3676 1576 msedge.exe 83 PID 1576 wrote to memory of 3676 1576 msedge.exe 83 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4340 1576 msedge.exe 84 PID 1576 wrote to memory of 4124 1576 msedge.exe 85 PID 1576 wrote to memory of 4124 1576 msedge.exe 85 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86 PID 1576 wrote to memory of 1524 1576 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e030a8a239daf3094bf5c8f92f9bd182_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda94d46f8,0x7ffda94d4708,0x7ffda94d47182⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,10608300697477598430,12183182500294052426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
308B
MD59be8c55d96ff9957736f4c1da1e37460
SHA164913d84fc3f6bebda764b286c760ee175c88e78
SHA256716050a5348c8a00b63be81b69752cfe52c32bc6ab930d5418c3e9ef2af8329d
SHA512f79b0dc99dea2d2202005507f174201f12076f74cc30ad94df310f5af87c3f6a4e353928ab644f7da0fac8944d98c051ffbf5a8daec6af505e2d2cf23f69d95c
-
Filesize
5KB
MD52356ad428ed2aa218ffd724fe6d7d3c6
SHA17fc5dcebadd62d33ee77b5697963c09a6c6e147c
SHA25662a722962e48f73cb7eefec3838dd93662d6482e0cf0b7f95286523d5f2691b4
SHA51237bc76bd21e5dbfb6ac703efa9e21d34a3c719b54013fdd17b21556b85bcd50e4245373cf724c9a2037c33b52a9d211599110d1b228eef17aa14e1beffda7575
-
Filesize
6KB
MD5e297d9d1406265c6ba9451112b8fd17c
SHA100ccfcb16f48ced11d56f87780b8220ef7184b20
SHA256e5fe48dd347cf3edc588f326150aa69cc9b6c0a8d89bb9515fb5d0786f49f5b9
SHA512e7d48b532917ebebf1f763cc19bf8c3e2e4b1491887b992ca14d2ed48f639b8f9331758cfefd31834f0b7e5f46bcb98dae3992c4bcc9f0ae142284e09ab0c409
-
Filesize
6KB
MD5829e5a678ebd9dfb3874cca571365e58
SHA16cd5571843465a6a56f49590dd4574d8295c9e92
SHA256619707fbb0299de67202d5d266a55a76874a50de8be6079388c651643225c842
SHA512adea0526b9a3ad51edf03fe61a6a8ae1c4de112cc3e04f22910bbb33ad91ecb9052ced2ce67965a039e9cecae804a3519efc4f3ea80debb0cb61854cadfb28f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD532b933e502751e5e0f8bed3d1548f177
SHA154371cde1ef18b9612da648e1121d37fac13e36e
SHA256c2f794facc6fb59ee3417a3d28fe5bd4ac57c962fc283f05887dd6d03a4d862c
SHA5123460b60707d76ee60e91096c694b2776d9e3fbfe273dc4014408b1854ff286cb40f065390ccc517fc451ef79ed6f06a9c0cbdcfcdc62cf54a2bd66d386852191