Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
e1db3416cd1252dd20b397293c1db56f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1db3416cd1252dd20b397293c1db56f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1db3416cd1252dd20b397293c1db56f_JaffaCakes118.html
-
Size
68KB
-
MD5
e1db3416cd1252dd20b397293c1db56f
-
SHA1
9b34cc9e6c51fcfabef4e87776548ed4d5647991
-
SHA256
53541c36a65b744df5102db28cce92bed16d6f23c87a00ab4ca8c0f0a2d0dbe8
-
SHA512
abafc5b26f8d725b7acae87551a2a17c46b3a10cae55f80cd2802c009546a5b8c31b250bbce5ef87823c695cd30c237fb560108d6936a04ec2b5e7863c4ff53d
-
SSDEEP
768:JiSgcMiR3sI2PDDnX0g6SSRwmSCwCBSCCtoTyv1wCZkoTyMdtbBnfBgN8/lboi2h:JgQ6mSnUSRKTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 372 msedge.exe 372 msedge.exe 2156 identity_helper.exe 2156 identity_helper.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 3244 372 msedge.exe 83 PID 372 wrote to memory of 3244 372 msedge.exe 83 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 1360 372 msedge.exe 84 PID 372 wrote to memory of 2916 372 msedge.exe 85 PID 372 wrote to memory of 2916 372 msedge.exe 85 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86 PID 372 wrote to memory of 4496 372 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e1db3416cd1252dd20b397293c1db56f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dff46f8,0x7ffe8dff4708,0x7ffe8dff47182⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,15775825518373695156,4284975044733002411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD51bd0442ef26e248e382959fa65064c4c
SHA1eb010b49a80e4be7aebdb0399de70491ed1a8210
SHA25643854cbd658c186bd14daedf804282bebd76996ce4c2397a41410f4ce27fcd8f
SHA512e7b54a7367bf422c538d2ee3456bf82fc30a4756e7001ee8c5a8a4a71c443ba3f64ea79bbc0f013a52cc38b04b8375cbe67b8346323b76fb6737da834561ba0d
-
Filesize
6KB
MD5f3d3bd888cdb2f74656ebf4c717bd00b
SHA137ea149fb77dc2f420e56ee0e9f47c3c869f9624
SHA2563d8a539cfb59be302ef5df18f76711b75e6e36252e81cea6d991ed128fadd358
SHA5127073801f4221937fc122349ccd4063388ecd5ac1bd6341382ff84b5b67f3e01295e561a83a609318b107a77414ca99c2d501df879cf0c3e90d654c2de540cc72
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c1cd3988ea60c907980c7c2b1e83dced
SHA14c5c9c22b56d16a334b33b0abfde1bd59857c8e1
SHA256b3fcf79cc9961d0f755e7fce338443fa5b5a53a35c2451c64972213225f3dbb4
SHA5129e384d302ee38eb5dd0607b5231be953c8e3aca20ac9e5ff0a3f22fab3debe9482dbacbda914a363cd955114f6740fffc63825469a5d9941cec30420c0541c90