Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
e09fb01e063b8d7f5f4f2350d22b50e9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e09fb01e063b8d7f5f4f2350d22b50e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e09fb01e063b8d7f5f4f2350d22b50e9_JaffaCakes118.html
-
Size
29KB
-
MD5
e09fb01e063b8d7f5f4f2350d22b50e9
-
SHA1
a2c89657939c49f592ee2f3c419eb93aa21dea3b
-
SHA256
35b498cac3ae2dc20991324267c4e05080cc970795e1ce80cab25814917309db
-
SHA512
212cfe6672da4d5a971810febe6acbe3325a9625b2ea3453b0b361e41e14301207799b6355159c52864510387083a431b487e65dcb2cc8b856569ccca29c0731
-
SSDEEP
768:haaaGnxRYnIS4tZe3cwk9IcRemWVnwXoIIZdVvwfbIqBdawj+Ys/6W08DGSn2:hapGnxRCDCe3cwkWcBWVnwXo7ZdVvwf7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 888 msedge.exe 888 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 3104 identity_helper.exe 3104 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 3908 888 msedge.exe 83 PID 888 wrote to memory of 3908 888 msedge.exe 83 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 2292 888 msedge.exe 84 PID 888 wrote to memory of 1588 888 msedge.exe 85 PID 888 wrote to memory of 1588 888 msedge.exe 85 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86 PID 888 wrote to memory of 2200 888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e09fb01e063b8d7f5f4f2350d22b50e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee2f446f8,0x7ffee2f44708,0x7ffee2f447182⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12505184339840575894,7230909661148670665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
6KB
MD534c8de354cf1ff13f023268ab0d0f790
SHA1bbf00d6f484a589cb362d7a9104cfe17524c2690
SHA256121583fc754394555cdf81c9030a391499f70195a6401607971e9bba6439d9bb
SHA51258ace921e5c20c46dcf8feda5a15b7d1e6401961857b78048fd2ecd3d069cb677d9c4cabbddeb9152eae508ccee44336b5d5e13248e106cb2f4b81de5d3039c1
-
Filesize
5KB
MD5777a9eff87bba1e2b78c12aad94dfc4e
SHA126a907cd05cbb50244d713d94592a8d76fbca504
SHA256945a54e875fd2e71689839766a62b2bd595812e3a39a1277e90c51d07a5e6d10
SHA512ee6e0bfcaaf38ed421881a6fdb3f0a664177f1eb7e519a8bdb0e317c96726074667810778215dabff159b9d685da91973c4200c941f0f3ff17dca0ce357715ce
-
Filesize
6KB
MD509dd0fc402152938cc1b2ffb7b8f881d
SHA167f6e640ec34b2f18ccdfbf11ee4f0e93df1f7bb
SHA256410f745cb7d5e920cfa1b728456c0f3c6a47643d69ff1da59b4f3d9c766e1ae0
SHA51284d7adfca96e5624bbc9e23a675b3292fb76e8cbd79ec0edd473017ae6f9276cc1807426acbe5088075e1c7c9a9328b6060c8d4a4940de4c013c5531195e6fb3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ec061f7a82f0ac6fec27ed0bcd7e19a6
SHA1f5ba3948ce92322bfbf36a7a58160acf1a5d6b84
SHA2564c9807b0d24e9244fb3533b92709fbbff12a8f6eb03fe3256f58013d5df1f8b7
SHA51205342407401d0be761c38e1466ab20beb6db504f72c11d9a2ce57809e15aa831f02230c47607b6c1ccf1330c121eff0550fdcea43cd9a1649d51a95684326666