Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
e151356c35fe90a085664069e0d769be_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e151356c35fe90a085664069e0d769be_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e151356c35fe90a085664069e0d769be_JaffaCakes118.html
-
Size
160KB
-
MD5
e151356c35fe90a085664069e0d769be
-
SHA1
7e6b571aedca10c01c7c2495eb0b0f55e4fcc176
-
SHA256
39e3d9f6e936b594b217f62fe65a02322451582bec005feab4ec11321b6c1394
-
SHA512
5ab49b0e9182530786bcdecc1c9721a31e426a0620c19ad043c254e3aef32c36581d8d6281ef088383c4da0db8e308525581182145ee49606a51c20989b5ccf5
-
SSDEEP
3072:Sr9e1Ou+byfkMY+BES09JXAnyrZalI+YQ:Sr9u++sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 3380 msedge.exe 3380 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 388 3380 msedge.exe 83 PID 3380 wrote to memory of 388 3380 msedge.exe 83 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4512 3380 msedge.exe 84 PID 3380 wrote to memory of 4940 3380 msedge.exe 85 PID 3380 wrote to memory of 4940 3380 msedge.exe 85 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86 PID 3380 wrote to memory of 1836 3380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e151356c35fe90a085664069e0d769be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9779046f8,0x7ff977904708,0x7ff9779047182⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,17112602126391740349,551994573115436020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,17112602126391740349,551994573115436020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,17112602126391740349,551994573115436020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,17112602126391740349,551994573115436020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,17112602126391740349,551994573115436020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,17112602126391740349,551994573115436020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD533701312d79d6353866d76f2ef4361a2
SHA11430f1450fa0395155495641a611948e594daa44
SHA25668bf532d6fe1674e4a162c2cf270902a6e04e3f37618ccb7743dfbcf019bd377
SHA512905835205cfcf4400bec7e0e853c2b1566b921ad2fcd7221fdd909675c5ebe51e7a25de78091c11643fae0e7a2068e372c5d74408bbf8df318b8e4ec8314f8f8
-
Filesize
6KB
MD5b3badb65ce83f7b94510db9fe7c6d9a6
SHA18a72583ecbb018cecae745f031925b0437bf0f08
SHA25605320ab31fc1b4c61ca7210bea2aa6ac3e4f77525378d967a7bc66c2a329a910
SHA51287934de80e9bf9054c96320c503eba9c01ac947065b404dbfcedc7995e986beb017f4cbf8bf14f48324df96632e08198adc70dc5889b697470a378844ccd8b5d
-
Filesize
10KB
MD553da10e1722e736235109837d40a3838
SHA11c40ac99a7935a366caa56a9d6315fd461306da3
SHA256cb4a516bc26904c697a3ac28fb579928a27fadc9334defa80c32c987e4e20309
SHA512350130b623ed56bd0b0daf468aff6f2ac32c9e069d3c8ad222a24dcf16ba01bfdb73c70fb83aee8df91903dddbd2ccfa88aabeb15a9b829aa2e230354768342b