Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
e1c1aafae7baebe2fa4cd760cb6173c7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1c1aafae7baebe2fa4cd760cb6173c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1c1aafae7baebe2fa4cd760cb6173c7_JaffaCakes118.html
-
Size
48KB
-
MD5
e1c1aafae7baebe2fa4cd760cb6173c7
-
SHA1
c31ce8ed25ffd167b928da45316bb6eb0c2ac223
-
SHA256
d7c86d96846d817f7a02fe01fcb434aafaf671306665821dc9372b045fefa68b
-
SHA512
0beff23173276b0d0ff09a93a98d7b02dbfa3d5418f5a5e9ddd6889fa7d58a9c11781ddc03a71c271d444370f2a1f7d6175f46e0b16dea939cd89d13ff020413
-
SSDEEP
1536:M4lAJi3QmFyzLuvz2p9xcBO6h4VM82XxOSTY+ezYihq:yJi3QmFyzLuvz2p9xcBO6h4VM82XxOSL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 512 msedge.exe 512 msedge.exe 1536 msedge.exe 1536 msedge.exe 1592 identity_helper.exe 1592 identity_helper.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 3648 1536 msedge.exe 84 PID 1536 wrote to memory of 3648 1536 msedge.exe 84 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 3908 1536 msedge.exe 85 PID 1536 wrote to memory of 512 1536 msedge.exe 86 PID 1536 wrote to memory of 512 1536 msedge.exe 86 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87 PID 1536 wrote to memory of 4852 1536 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e1c1aafae7baebe2fa4cd760cb6173c7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67b646f8,0x7ffa67b64708,0x7ffa67b647182⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5055244537385272525,12373589072907909532,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
185B
MD5efa3b79297b792ddfa72609e2389407a
SHA17c959b0d9c508607119d7c112fe81939169c8ccb
SHA25604371cb7276a5868761433e311d805f97da580075fc9bf1a66f0a9d8ac9a4017
SHA5121f08b7ea9823ae979382586db83b05c0d0dc5cb565b3946fb8134c0dfaaf61fdf80d6c666ceca6522964ac446d2a2e798e1f0eaff3dd2ab5cae88a793db20eaf
-
Filesize
5KB
MD546c7cce04ab9947068b383ce9447b7b7
SHA140d2443434efa32c22af12cda2db4486e7dc195f
SHA256bbab9b0aadee26f2ff05d26ef1197b404d06eb114c0134be4c7b729a8163cbff
SHA512ce3f6b80e1774fcd20054321663bde4d3afcc84da1c80d5f2f615c75c89c05bc97c72eb618d1d5643799941f20474b92c83692c9deacd50c6e9197fe5126a364
-
Filesize
6KB
MD56532eec089ac8ec7678e6df3ff33ee5a
SHA10fc3d57878e0d58340b69cb947c3e0e7c3c4be0a
SHA256aa8f82efbf2621abdab6e15d2826700db9414229741304d8bc831acf6340c344
SHA5127ed01814b7b298f60f9891f6903e1c2262e9166edd7d6363e57b235012b1926f3fb8bf7263df01a373251495324337637b59313a95e9be77166da19c3184f6a6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5508f96e0baa5e9260fe069081580a9d6
SHA12be134b7822b1b434534c9ce48223cef621800ce
SHA2566538f53ed70221b5dc946f47a152b030d6dd4a5502a53998f6273ea1047546cf
SHA5129d76cc1e024e6f8f0953aa93d77ade8d56dde0f933b9bc9e973bb07bda83086da86db1fd2f68cd81f37093e2771e287de00b7ccf3203bc5721d96a49407067bc