Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html
-
Size
190KB
-
MD5
e9fb259c829291bf63e4ed4d825d81eb
-
SHA1
68543107c3471b8532248071a7114cd5b24f4971
-
SHA256
d25f2e2e712e4109e47a5466b76fac0ee9987f9cd2bfe6bc09ab40d840874907
-
SHA512
e22364bedaabc8ff0101f1048ecfb310eefb9a88a5df0ea611a79e34ada2578583a565e59b66932bfe2e460a864931d945d86e8d02d810ab02e52969b745940f
-
SSDEEP
1536:SUieKDqnlUy/5v+949x1YeQe/eWsEyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76L:S8lUyX1XyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3540 msedge.exe 3540 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2208 3540 msedge.exe 82 PID 3540 wrote to memory of 2208 3540 msedge.exe 82 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3588 3540 msedge.exe 83 PID 3540 wrote to memory of 3500 3540 msedge.exe 84 PID 3540 wrote to memory of 3500 3540 msedge.exe 84 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85 PID 3540 wrote to memory of 1324 3540 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5f9846f8,0x7ffe5f984708,0x7ffe5f9847182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6213207018009338629,589503111208394255,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6213207018009338629,589503111208394255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6213207018009338629,589503111208394255,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6213207018009338629,589503111208394255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6213207018009338629,589503111208394255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6213207018009338629,589503111208394255,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD585e4df7ae8a23c6bd97d6a36480d8c40
SHA127664ee7ba4b4e30ac24b81387c103156cfbaa19
SHA256b6c155e1a235bdfaa5fda02bd83606ab3334da133ef09ad55dfff592f9f98b3b
SHA51236494e9612a0082e99cb76703a1cc3121f063b86d1c54cb90b0b7f7358357a3970ae7ab972ff29d5588d2d38b8a0c1f30c2fbfb0c1cdc9efd98b1a4fe1201dfb
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD5cfc679855c76daf3921ea956452c3437
SHA1eb28c0a16db27921989c255dbb8269769054ed0d
SHA25661aebef44de937a66698b820c313737b321b0e547242c89be4f25d16e25766ba
SHA5125d4187887a218cb420fdcbd5fa5d8df11bd1eb44653a296853eb9f7129728eef655dfd3d7b6f64993001e5dc774966de8dad60d75dd44759336d429a2ed5b160
-
Filesize
5KB
MD5fe268515bf3ae782cb72ebb296532de1
SHA1dfd28fe51a008fae7af1cdf36975d147c8c8e756
SHA256a0f08fdd3f23c22652f87f407ae355bb03b37320cf2ee6f322c25c735e67a47c
SHA5122cc3f7bf06aad6b6f95d1178c96f563befc2c8a92ea5647fc6dac3bc48d3eba59506da0ea356fbbe907e0cb25b77cd582c10e52e1c9e71f5ed526e7be74a07c0
-
Filesize
6KB
MD5e6d052e634015960e0ab3ff621dd664b
SHA127618e12f8426ed0b7babd35940058202898728b
SHA256fd60aa9f5677c39128f4ba315583b541821cba7d67db161f0ed14ffbe5201df9
SHA512c1c26307296758c81257954358e6bce15b11cad55b321f9ac6f5edb1b118aebb27e47e0974abec11c3dbf1ce904b7755c749e21ce71c872f04e65060b4829890