Analysis
-
max time kernel
100s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
e0af743fd00c21a190bf8e6965f391ec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0af743fd00c21a190bf8e6965f391ec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0af743fd00c21a190bf8e6965f391ec_JaffaCakes118.html
-
Size
22KB
-
MD5
e0af743fd00c21a190bf8e6965f391ec
-
SHA1
feba6c94deecee73c824dad3d3ef82b2fec2c57a
-
SHA256
110e9aec08d74c6e7dea935e4d3d314293b2b118434429716db1725d68828117
-
SHA512
8db8e0b09c6da796ab1d4f2a3b1614e501bc26b2e51f5153b885bc2fa3eef95944925625389e767ce060ead4f3959f46a1a3a318d5d04b41935c53c0f00e5277
-
SSDEEP
384:7QEtMNaCLGwXggfJ/CiUcxLaM5OSL5vvWTpoYWpomKpoCc9pocPpoy3poSlpoxpq:erciBKs9hp3HlUnXdRevZkWCK5fzPg78
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3432 4744 msedge.exe 83 PID 4744 wrote to memory of 3432 4744 msedge.exe 83 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 3888 4744 msedge.exe 84 PID 4744 wrote to memory of 4884 4744 msedge.exe 85 PID 4744 wrote to memory of 4884 4744 msedge.exe 85 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86 PID 4744 wrote to memory of 4324 4744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e0af743fd00c21a190bf8e6965f391ec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff83a3746f8,0x7ff83a374708,0x7ff83a3747182⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,4760315271979425604,2256842189766772924,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,4760315271979425604,2256842189766772924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,4760315271979425604,2256842189766772924,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4760315271979425604,2256842189766772924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4760315271979425604,2256842189766772924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
182B
MD521288b4d9c0c0113b527ea64b5388e34
SHA1634686f9842986ab0a3419eda6aa8f70f9c388cc
SHA2564c7d2bb7f631e4d60278030e90bba17d19e024ba27d9b3e980587f3525561788
SHA51245cb5e6cac3cff3a39b3e7f14c3b7eca0003c69218d69a8426e7cb843ac87dcfcf5e8e2149da337265a8ad2aa9d899956686a7dc569875dfe33efbbc3ee50d71
-
Filesize
6KB
MD5a707b8ba000022780071239d5bbd973d
SHA1bef03073e8cd4590828145e9afb919ab50ffd614
SHA256273d6c01d84de1b911be8f92f8db30c174af46912a519f70b7bac613826f068f
SHA51276272efd7da2fd0733ff175fc2717171afa65963adf1c777bb1e616a5886768775cfc2cdf67dc975cad78195c1e753611899190ce41cddbb3b38b6385695bc8b
-
Filesize
5KB
MD56213ab68df88922de1ab6f1305df7412
SHA1e223b30ec590ba96fa6cc1ec45c74aca2067125b
SHA2568ac3d040de24dbd47c647445316705f4cfab6bf9eb8d30678e22404e3722a48b
SHA512accc2b86fdc5d742b24b97be31e47939a5a6f3859b031f5f8db287068d870624bbea9c2f30b31bb1f0138b332705c58b14c25a998da56d11a8b30378c6ba705e
-
Filesize
6KB
MD5c929508ec4c30ed7ad9ca689ea84ab31
SHA1034351cc40ea6ca3d7f7e685a28816de51aa262a
SHA256d1e5d5cca4b3c8dc7938004fbebb64f48e5179705b4b698f3cd4a1ff6b121d18
SHA5126d75b9d248b5f945af4ef61f524811728d9c4bca409911ea6cdb256c154134ac48e28fbfc8c06c43cf060333a0a52b1a9cbdd0ae51d7c5ac0f5f963c8fbca529
-
Filesize
6KB
MD587c1712a3c36f9da84e11651ce3d5d68
SHA18e5a71037f7a95ec65360b39d4f433f3cce7cb5c
SHA2566d89614de0c02236c0a4d46be3de6fc7512cc176ee963b4493790b58ff297924
SHA5124ace3df4253002484a1eb5e60cd38e8eb15f61ba7a6aa6f8c61937f8d38f62eb97cd63354ad661457a5038659de7462a956ee2e81306cbdba0674fb57d7b19c1
-
Filesize
10KB
MD5787e9c8dbdac8fc882795bca9fc24529
SHA13395041b110ad38967a4a7ac1b6f25e2027eac90
SHA256dfccef46c44af97d7bf48ef7f80baca43e68bce7a6459157ec9958b741e8c1ad
SHA512137047f3b7acad7af0a13c8877e104747e4f686e363f790f6d006cbc5202ff81a51425894937705132644075d641c95287c133d85d1b49ebabc1cca72603f309
-
Filesize
10KB
MD5bbf5dd47812396a8924a90894b7771ac
SHA1d4ef675361facbe5f77854ffec38f17d0ad48c92
SHA25630e511f3248883b748e10086fe18e2f08db0bc81a33f57c3415cc9db57c35be7
SHA512fdce908d8491988ac0e5238fda2703f8501864e3c521eb04aa5000d7ce62d3bebfb709ffeed342d1fe2bc306772ad136c7ac3040f800097b55ad457096b1ba3b