Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
e093195a6bebe1d375299d79066351ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e093195a6bebe1d375299d79066351ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e093195a6bebe1d375299d79066351ba_JaffaCakes118.html
-
Size
329B
-
MD5
e093195a6bebe1d375299d79066351ba
-
SHA1
973e5212abe09d16a2665f4b7b14979847263b2d
-
SHA256
ff544fe94d26efde497f26a91dc489ec69343e645ecf3711c409aef69679dad8
-
SHA512
438fa96f11925702c66ebf3561e9d9b65bfc7a60bf3ee35a3db52a7293fe91728f7a5d958451039a2e0e19f418b9f504971dc4618d83190dc99bb602243ab13d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 3240 msedge.exe 3240 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3604 3240 msedge.exe 83 PID 3240 wrote to memory of 3604 3240 msedge.exe 83 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2832 3240 msedge.exe 84 PID 3240 wrote to memory of 2424 3240 msedge.exe 85 PID 3240 wrote to memory of 2424 3240 msedge.exe 85 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86 PID 3240 wrote to memory of 4852 3240 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e093195a6bebe1d375299d79066351ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa240646f8,0x7ffa24064708,0x7ffa240647182⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17081126164289790820,11343623995539550684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD59dabb4188403b36fee1d7b3e663585e6
SHA179962912cbbaf5ee71a84932cebf9a0cfd18733b
SHA2567b150cf3ec0f2e13b4aac790effcb2ae0dfbe0e3b6625729f437ba486d33bc13
SHA512974b7d52114e5775a0048b73b989c4249d9061b1f2e6a1b426957e8648d09b0cecbee5c0548fa46cad3a3f1e50d22844b9fa89c716a1e1d47bc9d26592d0d0fb
-
Filesize
6KB
MD501e5233fae4f56ce048a667466641444
SHA1a10e10fbdba8ffee85649feb555118533527916a
SHA25653033036c5357c70c7072425020c7376d7cd9a76ae5bd12e8683c21ac7481506
SHA5124c2390bc40aba87ecc2929e2f0a5d4745fb830d8295f0b3c4ddadbf80208ebbe092c3581e7613c48b5c1bdd4a3fc9297010a4b5e488e550b1102097d1cdb1272
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f1955a7f03f773a0622bc0fae577ecb8
SHA165e62f9351ce5e7e71cc329233b1045bbaf45e35
SHA25675a816740345cfcfce2111cc6144c6f9e8742e6b575cb72e8561cb0c41c730d6
SHA512fcc38771e47c9765cc4e8ea34dff7d7d621cfd69eeb14b04565fe3275c1ce42f03f4f6b542b44cbcd30aca4f829e2db1d7eaf5f31b3631c88fd4d190849718fa