Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
e195fbd5c1b26aec1ec1834cf863a37a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e195fbd5c1b26aec1ec1834cf863a37a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e195fbd5c1b26aec1ec1834cf863a37a_JaffaCakes118.html
-
Size
23KB
-
MD5
e195fbd5c1b26aec1ec1834cf863a37a
-
SHA1
96ed935de8ab130f05d6a59506b6a4556da97110
-
SHA256
df66f0584f5c2731df572ad93ebe1b9ac262b3763727e6db95e0daa2e4185818
-
SHA512
7ba25b787cd1b011de43f2b977d2dd8a2beb06cef56bf643ee14c87d5ce37683c442b9e62fd8968767865d08decee6f22d80f8658502a7207d71c9f125d4727e
-
SSDEEP
192:uW38b5nRSnQjxn5Q/knQie3NnanQOkEnt4GnQTbnVnQzlCnQtnwMBXqnYnQ7tn0f:8Q/Odf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 1436 msedge.exe 1436 msedge.exe 1112 identity_helper.exe 1112 identity_helper.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 3976 1436 msedge.exe 83 PID 1436 wrote to memory of 3976 1436 msedge.exe 83 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 2956 1436 msedge.exe 84 PID 1436 wrote to memory of 5000 1436 msedge.exe 85 PID 1436 wrote to memory of 5000 1436 msedge.exe 85 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86 PID 1436 wrote to memory of 4636 1436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e195fbd5c1b26aec1ec1834cf863a37a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa591d46f8,0x7ffa591d4708,0x7ffa591d47182⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15727240545292414551,39760125152782252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5e1fc4bc3408e02bafa050c3991575243
SHA1cfc8358bbf24c01218676da3ec9fa68ebd7e52ef
SHA2565441c730c068bf9a499dc8fd7cf06f9fd754b6058554db32bf4a12846daa6444
SHA512164882649fd6e687927d3d8b004434cd0b9de72ea191c90fae0f272e52b7103e910f57f4b06329becf7c11592c7b2961261938b79dbb5dc9c42c1ec7fe965fff
-
Filesize
6KB
MD5393632f67e326c6219792f86c59f1e0d
SHA1ad45b57beabd9a98541fd0a01e479ee62cb8bef8
SHA2565261eae575ee20e5c3d23665245ec0b301cacd58a47376b54a75be68bfbfa613
SHA512b615c157e669cb8b15f1c583762d914f6c4b9fd60dadaa6bf465a5ca6faaa1b77ca45be77a1de9efece378fc3fb6de8a0a03687e6df8e63304f14fd45c473169
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5735a03ca2a5d28ce7752186d2133bf6c
SHA193ecf673ff36cd4207ee873b299d11f788f6f602
SHA25648f3bda7c135e444829ce723270000dfc3420575b37282b98eeba2652743a62c
SHA5128e2476eec4200b718d7c78e82dac2d012e34ec444b179aae5bacca278879e6105731a6411dbf31e5289dc6ee14466980fec333c8fbc376fd34583adcf9dd9bf4