Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
e18dde452f3e824cc8d2b9c94fcd03e8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e18dde452f3e824cc8d2b9c94fcd03e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e18dde452f3e824cc8d2b9c94fcd03e8_JaffaCakes118.html
-
Size
69KB
-
MD5
e18dde452f3e824cc8d2b9c94fcd03e8
-
SHA1
1c73bcf3a84806ce3a4ab4190e04a8f312a92604
-
SHA256
7921562eecb8c01dbccb315b48fdfa66e1ef66c0281ed12f72e541133b0d427c
-
SHA512
ab12be4b0d6a549a5c0fbc8e16781b9687f5072f6eba2062ea8ad9d46925ac81ea1e36136335800a27135b7ca2d3346302c86d1c62baea6fdb7447ee30b1a5c4
-
SSDEEP
1536:DApjksO3pWqxJN5TZI+egPDMHGv/zVmsGEYl658H2VoNxCA84RXWz:Dyjm3pTDRDMHGv/pmsGEYJE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 3936 msedge.exe 3936 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 1064 3936 msedge.exe 83 PID 3936 wrote to memory of 1064 3936 msedge.exe 83 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 1632 3936 msedge.exe 84 PID 3936 wrote to memory of 4908 3936 msedge.exe 85 PID 3936 wrote to memory of 4908 3936 msedge.exe 85 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86 PID 3936 wrote to memory of 4944 3936 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e18dde452f3e824cc8d2b9c94fcd03e8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff526546f8,0x7fff52654708,0x7fff526547182⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,11715215464733542444,347104084178708028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
304B
MD5c24d9311c97f159977f3a80dd60c8b3c
SHA16808f68a76aefcd549f8e4605937790eed2f5d6a
SHA256550f5777fb2a05549cfba4fce48ba53eb9d117c5b6bb8f847474db65e4ddfa50
SHA5128f3426b8ec0c4391a51888ef3cb0db13073baf871838c8fa2bb09508933fb69024f5417c8a04283ef498078f5960ef1f540bd374c4bc9727cb675c67d54db295
-
Filesize
5KB
MD59a20c24a401245bb3e45e02ddb267fdb
SHA159386efa95dd77dbf5a4f84db1391c1eb6272a81
SHA25629ac379b153a9d21e3d088da1edc491aaf8dfbd18762d4b1854235121a5db42c
SHA512696f6a63b7e2ba0af256171b60f24f5bed7a894c2d988258ae618e7ea90ba61ef2768b4057fb4b8a3a34fa7a5498cf88a3a8f1c96be4d69cf053dd254cee6af4
-
Filesize
6KB
MD5afe82befc2e75cdc82b2b70b3ca699d1
SHA1d808922bc5dd2464c6325ea94cfebe568c16e8ad
SHA256eeb7939a2448671bbe587035feca9e384542810b51393222f1e946f016e7c272
SHA5126b7267cbea0a959681586ffa7a5eaec497747eefd386b23104915fe8ccc7eb6de09a8e6a2685db2e02764a8c5a130a7627274687beca13978e2fed48d9600fba
-
Filesize
6KB
MD5b3bd7667b5355e3f67fd383f0dbf8475
SHA12f532f2b6a2f6f32f448569695e525c38b43d2ba
SHA25667bc919fe4712036f5920f076e0a7bec2f24a7096ffdb6aec722b944a3a2641e
SHA5121d7d31aa6a435b107ca7133863c43ffc1ee035ac234684cf6261f31e0a7dcf5bc8376a88613038b0f12b63fe6db154a93509bc7a42c9c49a74a7af2bf6649731
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a11e8560ffdcc7aabe373f797b01c0e
SHA1664965ab7a4364e78cbc0656df7f3b652696475e
SHA256a582f2096857e198d333307be18d82a282635b98e61cb36021ffad64f40532df
SHA512aa4a290edea5fa91970deba43313199bc9f75d1c5d8d6ebaf7554da601b83dd63aceadf866f8a5f0cc36666fab93a4df456d54b9a14616efe89e7e9ea1f192d9