Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
e1c54eb5cc482d88b199ad566f1b83b8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1c54eb5cc482d88b199ad566f1b83b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1c54eb5cc482d88b199ad566f1b83b8_JaffaCakes118.html
-
Size
18KB
-
MD5
e1c54eb5cc482d88b199ad566f1b83b8
-
SHA1
589e91b6e8bcac5bb821815cdf3c43b195244a10
-
SHA256
0a15df0166d6187f1d6ba17f6f1d24a78069f2b97885edd8d064467d42d51b37
-
SHA512
657bf761cab7dbfe7019ba03fd7eb9b64970c4c29e5e43240e3ae3d6b71c337e7acbe307bfd9ceb1023e8502087cb9d77924c7465202ceb58ecfc1719190262c
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI34jzUnjBhV/82qDB8:SIMd0I5nvHpsvVExDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 2892 msedge.exe 2892 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 412 2892 msedge.exe 85 PID 2892 wrote to memory of 412 2892 msedge.exe 85 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 3816 2892 msedge.exe 86 PID 2892 wrote to memory of 1692 2892 msedge.exe 87 PID 2892 wrote to memory of 1692 2892 msedge.exe 87 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88 PID 2892 wrote to memory of 4636 2892 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e1c54eb5cc482d88b199ad566f1b83b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa591d46f8,0x7ffa591d4708,0x7ffa591d47182⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7835558548384096076,5560265096065979025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,7835558548384096076,5560265096065979025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,7835558548384096076,5560265096065979025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7835558548384096076,5560265096065979025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7835558548384096076,5560265096065979025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7835558548384096076,5560265096065979025,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD58cb7877ee84d01e62a7f03758bb9568c
SHA100837a874a7f257f509cd2b3e3c77dc0ead5078d
SHA256b38ed73c90e4ebf8c3f61db2e25fc89a3fd1dca451d81de5f3991e8c537a46b3
SHA512d405e7d8b4b2e2343053dc3e117419994e1a6ddb760dc6e613b6284b46da843308ee8600de0c19804ffb6d4f700e53a2c9f2c30df1f92961b832bb6387a8f727
-
Filesize
6KB
MD5b5085a338cc55d28c7654d56fe3014d6
SHA1673ed9e33f491d4b9630b5524fa87cc4d431963b
SHA2565eafc5522821eb697095f0a8687c7f9c2451db7052c3d2b55cc6f3e63a945163
SHA512970f5b983eaa9dbb34c32e2609e569f721486013786c03b6fb93115c92eac8dfe5fdf3ec61e7b2ebb4627c9b9abd12e5ae76b343959eecda2b5feb8e74258d9c
-
Filesize
6KB
MD51fc6d56a49aee0565db88e37d2cbb942
SHA177d066f44245f08fae6ac89141eb002745b13c5d
SHA256a45d6f05c7e14cd0b3ba333959b1272f8717e196bf6762c66bc48e6a65212284
SHA512a91c56440f262da2f7a79c4ac58aeae92231417639f49fa2b9356003ddf3d65d3cbb6244f4b34b1dee0f3c1fc9f548478d285b293f0416add8375d98b8a9d664
-
Filesize
10KB
MD506da188ef5c954bc0a0150dc9012d711
SHA133eaee2ab2b742674186631b358dd64c2ac81738
SHA2568cb530cb6f46aabdd07ac021a300067b3aaa100a63921bbb6a8f49b18d92e7ec
SHA5124b41c3367d5ba6a5526ffa713d4d076a90789ef75195283b6a58c322819e4a4645e74bfc8a4a70c4c62dbb7e5d5b63971d3a069c69122ed86aa5481bb700bf2d