Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
e2463a39dea66a1e9c59128b4a6a43c7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2463a39dea66a1e9c59128b4a6a43c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e2463a39dea66a1e9c59128b4a6a43c7_JaffaCakes118.html
-
Size
33KB
-
MD5
e2463a39dea66a1e9c59128b4a6a43c7
-
SHA1
7455754b2882c134b10fbb52d95c18239e80047a
-
SHA256
b5fc9c64b0fdf27539811bf1ff88b796cd9a4ec3d515293cdc72ceb6228e04d7
-
SHA512
f811cdbd4cf9f342473da0e5e2872e9973daef7ce733745733baeea30f5cf0e5a0259cb963f6b40bf73dec192dd323cba1668ed3cfb3c7c019f0ac13dcb5dca0
-
SSDEEP
768:FeSmVHPD0fc43zwZop4RmjYuQQNpWk/kXoav+4eE:FeSmVHPD0fc43zwZo2RmjYuL1/kXoavL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 1740 msedge.exe 1740 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 940 1740 msedge.exe 85 PID 1740 wrote to memory of 940 1740 msedge.exe 85 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 1492 1740 msedge.exe 86 PID 1740 wrote to memory of 2792 1740 msedge.exe 87 PID 1740 wrote to memory of 2792 1740 msedge.exe 87 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88 PID 1740 wrote to memory of 1976 1740 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e2463a39dea66a1e9c59128b4a6a43c7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15872961076457699604,9244533376530448435,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
588B
MD548f5d9a56caddbe31f311fc30f201434
SHA1c0b4870fbff4836882f42280843b9e78fc550c7a
SHA25657613cae619fe224e53d6f61f3b3b46964b7f7c13fee831334a363f3b60fe2a4
SHA5127b5fec97ee55d2264fb9f6aaed70f3a2d191f7bb648d63dc06c52108ee1334fd036682187ed67ffe5846565b83c9b5937813d4be4677a80cb2ccbacf7d7f8c35
-
Filesize
5KB
MD5a00b7122857685d69933b34b15b04d5f
SHA12ba66fdea067fddcecf7457be84d32271500407c
SHA256be73c86fbb04fe5508b5b1ed92d90de4c1525b8bd12bf42bad5ce1b1b6f9dc75
SHA512b5679638baa6bd33514e59f943bfa8e2fd41b646785edb674ea01bf7b1f41deff79fbc61a80da738663b6b94f8a0bc714773083ccc07f01f90575912dd536817
-
Filesize
6KB
MD58528594d39d4d74fd77dbd9a11ff701f
SHA1336b90783faf278cb842f30e5c036f911f58678f
SHA256000637f5dfe9a1913c8c15bc30a9ab1eda9a2f9266bcc69bf21f45235ecabb42
SHA512ffa79cb55c8345bee3acdef222fda40d5c59bf1656ea8ccd379359b96587e83277b06883f1d3ec339584c0480cdd399705357476772bea4545d0684d8a2242ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59b01d4ecb9f5b7a25bb0fc8500233ba0
SHA185f81979617e548ffd1240b1f22a6b69b4e88106
SHA256c5bd3e0074ffcaf916f2d9c0705172ca7ac14cebaf94b4b7e75621d808c92e6f
SHA512e51155dc4f42f2d73343ae9dae617675e5c9a09f9427057b70ab88b9ac101798ff3c2aa4b924f39be511b7991b0f02494bd14f0815713e68823cbac7a714c622