Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
e2282f29a585c373c973fe88cbe5b51e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2282f29a585c373c973fe88cbe5b51e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e2282f29a585c373c973fe88cbe5b51e_JaffaCakes118.html
-
Size
90KB
-
MD5
e2282f29a585c373c973fe88cbe5b51e
-
SHA1
9336037a11dfc3d393b8a27202014fa497d42a5c
-
SHA256
1e7e12384ce1f47a1baa160b89c1c4768722ed29e223d7915c05a1f6343b5b5a
-
SHA512
51523b944572edd74a45e6c3443d3e0e59848d9d9ef08c4a4ce06d6f0c1e410c35fc05315d6796f86446afd55e387515f1065dd0ae3400ac13acda2f06341eed
-
SSDEEP
1536:bTzZQSHhnjRawnBwvmevm53xAz/hWufBzOHKwAqariBIXD:3zeyjRLBzxADMwz0K/qfBIXD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 208 msedge.exe 208 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 220 208 msedge.exe 83 PID 208 wrote to memory of 220 208 msedge.exe 83 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1688 208 msedge.exe 84 PID 208 wrote to memory of 1012 208 msedge.exe 85 PID 208 wrote to memory of 1012 208 msedge.exe 85 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86 PID 208 wrote to memory of 1384 208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e2282f29a585c373c973fe88cbe5b51e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e0d346f8,0x7ff8e0d34708,0x7ff8e0d347182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2696 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2651441333737242788,9881521709355004649,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59a2f92eb8d3cbd623ce2e4d392653a9f
SHA11891d4efaa98bc2e980f648f6ab656c5f691d7be
SHA256acb4469b7c357b81088511eaff472ff192d43d9894e3b6aab0795f5b2b20ead0
SHA512f6a52d9d892d86071af131f958b2a4a68cdaa20f2c58267efa934ae5918438b5f40b85bb9b7a18959339a26f6430ee5421a0f8e01b966b3250246ad293c23e1a
-
Filesize
1KB
MD5de8bb1aec27835bf2096c92b555f457c
SHA12f6769e67a50bee600b15f6f8cb2de09a5bf0839
SHA2566f4c8f8636329cc69910c210da1077f67508ea5a1da46cb0c466a661b5a81f8c
SHA512c8dd885ec2178ea22d87dbeec3be358de238c79a0619836305ea267be3cc323b5be2660dbf137cb89d7e912f2f9c1d69646f7bd8633d0c1abbb06849733444e6
-
Filesize
6KB
MD52930ad5884605190875db3ccadeb5c18
SHA17c2bb13de2b8ea0ed11c53b7ec5f575995474f2b
SHA25641ac20e797e5d53977aa7d6cc7acd9bbebd539d50c61ca9fcd7c59d7c3a04de0
SHA5124d95aeca34837f7c48a5865f4c6a71d3dc88abc521bec995697e82dae6f55a6f21c8e2b700a813e9b78d6aff6fa83380c0839fc13d765df9f853998be5155bcb
-
Filesize
6KB
MD5c46c77880876e50f8ef3705ac4d0c2e4
SHA12d25fbf9b0a9c03a4358cc96c965b83bdb026d77
SHA25604130b3a3786df6e17d89392ca487e5329daec04543fc7c915ab94ec582a6458
SHA512a26db514fa56f6a673026e26726a71126aab617b8109f887920723e0a6d687154e8283a4d77bb904d56187d6f31c8a17f24c7f843b4c53fa197d90d6b6477916
-
Filesize
5KB
MD53c89e854a25bd88d1f555a0fbfb5219f
SHA188a9e0555f4f131ee877336c15232cbf6c591d01
SHA256240b65f44deecc57fce4648644fc6cd7b1b3bcf88db15ec8c1be0f559befae90
SHA5126d972de855c7d1aa8526eb3e1bc04765ad6953765bb357808b063a10e664c0be76386597661a7e5e004b118789015c5599f527d09947c47f96903e6800ba56ac
-
Filesize
10KB
MD57bac7e4d1091ca052641d95c5944e6c1
SHA1cf3b84e45f7e7f5d017e070229ada9c24def691d
SHA25602aa5443336c029121ea8b4764c46a9afaedd5bd8e51561c4ecaa8e2d9d5e7a9
SHA5126881e4c9a5681ac55eb881a84fbd939335967d430787b5af803a2a1d15c383e819f4500289a40bfdded5b1560c09ad1af025e2bb6c10310f1e46df5b8b8af4d6