Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
e07880d0f867dbd4b32c95fef96ed585_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e07880d0f867dbd4b32c95fef96ed585_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e07880d0f867dbd4b32c95fef96ed585_JaffaCakes118.html
-
Size
125KB
-
MD5
e07880d0f867dbd4b32c95fef96ed585
-
SHA1
4c2a5b0834e584f956442497e9abb1621476141c
-
SHA256
e0f08a636df2f030c0c1d14bb7cd27b908866b7ebacb87bac4825f259b90feb2
-
SHA512
c67ab58f6edd08d7aa7d369e79031004e5a385ad1cb8c9f09c5f14761d40dc1c5354394d9d39b6468ff1e3f0fb3edd2a3eedfa853b9aa1c6ce7c43830a9e9865
-
SSDEEP
3072:eTd2CFL0GtfdB558omEKIOZP7qWGEsMUd0NrQ:4Vf3558oKIOZHPsM3W
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 3324 msedge.exe 3324 msedge.exe 3524 identity_helper.exe 3524 identity_helper.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 1892 3324 msedge.exe 83 PID 3324 wrote to memory of 1892 3324 msedge.exe 83 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 456 3324 msedge.exe 84 PID 3324 wrote to memory of 1360 3324 msedge.exe 85 PID 3324 wrote to memory of 1360 3324 msedge.exe 85 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86 PID 3324 wrote to memory of 1976 3324 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e07880d0f867dbd4b32c95fef96ed585_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffe8dff46f8,0x7ffe8dff4708,0x7ffe8dff47182⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6843673620259684810,16679583762408042804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
830B
MD5958f33c8945f589c5d3dfad936aedb46
SHA1a7fe66007388210e28e7335a0184fb48a8f7ce6a
SHA25654d2df49e1a504a8c63cb2c9d521dc0904e42c7d5e7ad9575b34555c74ca9de9
SHA5123bd76d0bb352aa3a930d8fc963c5b8061fe75294920a1246f519dcc1139cc92e924557507df782efc2ff1bdee76bfc56e4dac47d39c8cd76d6123d7fd4b883a0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ce831e8df95a5bc6232215819c9c767b
SHA14b515816dd10c3eb469875321a9bb09c35496768
SHA256e09365567f0c4fb666baf46b00e3c978390f3f1b6c9b5d671fe6b3df04f6c025
SHA51203345e7aee019367783b66cb928c5807502cb5c867b68e4057627a84c2f45e5546039c118b1c040694b72d7b5e43d59838fb5dd48ceb579261734c7a7ea80640
-
Filesize
6KB
MD5ba213661f8fc11b5d2bde796c387d11d
SHA100e1aaeb4759d7e41e14351fced946f9264c4cd4
SHA2564296819ab7317d955ff387f136f72a7e12557fb66a9b9cbea48e3c1b8efabe56
SHA5121067e37b85579902507c2d8609ea31c20f0c3de3822b92701ab35ac7b95ed56ede26939fabc0f392864a0f30351315a6885b4635a1fe97039d8edee8180f1895
-
Filesize
6KB
MD5cb14a10995c825f7edfb1ce5653cae81
SHA188cee9b32fb871fab9e5b54d050489fc339e677c
SHA256478f0ef7683689186537d3a51b8aaed6715088eef4544ccde767b0fdb2713836
SHA512af437ece4ee624e212a3a670480b2287969e29c5a100c3b75b775c6b813321a421f5a2c4ef5fdd57987aef54859b4b337a19506ca91628d3b6049d1cb8fdf18f
-
Filesize
372B
MD51a12962a5476055363882102664ff6ed
SHA127a848555359390a3b5cdfccc7b8bf6fd617eaaf
SHA25644d7f679c43f12b51b794334dd5ce9aef8173f8f187817bc85a6d19ff2f23dac
SHA5125bc3f5ee67cb5a19a89f855e6fb1f0226605b4a3763ca9ac282f4072301e1a09dc8aa0d88ffe07e63f20aa221bb93c44422eba96348670ddac81e0eba8ca58bb
-
Filesize
372B
MD56b6949284843b08a50909a07af35797a
SHA1a10e77bf9bb26bf8534c9d972d9c72e324fb67f3
SHA256d0545d5fa9ece6902dbbbf92d36b4a67235ddbd02d46653b62512805e915dec7
SHA51236631d5bd0921772adc5980c6942322eafda1c19651b64fb0e44edc518f85fa5104c6ddc2ecd721618c265cf2d68f0b45ffa8cff25cc967c4381f1ad17321c33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD526e7eb77488e622bb52f30fe0f9f8151
SHA15ac324296d4dedb848b2791bbaec435dffb380b8
SHA25628ec5f930eeb4dc61eaab19ac67152654d65dc8472375c7cbda4fdd53e64e5f5
SHA51257511a6e58e295c38bdc12d13319d5644d094e6ee64661a290aa203cd6330d50087f508667135b4c66b587ef4d83bdb1afdc620f889e57a6b1cae25daabcd5cf