Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
2e6ff2d84722d0c0558ee409fd283ce7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e6ff2d84722d0c0558ee409fd283ce7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e6ff2d84722d0c0558ee409fd283ce7_JaffaCakes118.html
-
Size
14KB
-
MD5
2e6ff2d84722d0c0558ee409fd283ce7
-
SHA1
9a8d85b0182cf3228450c776087eff4797aa670b
-
SHA256
7be31ca4c8a11ab98f12e86339ce9d0bc46d4b2baa2f27ea957f913a2ad357dd
-
SHA512
7f916f2ca011bd0d011acd8b6d0960e2302a238c1466ae385fce9a0cf6733295e707f55702943a3a2c35862b4f746e57df856ab950b2c40f59b9286d3ed83cdc
-
SSDEEP
192:J1f83pb+2bRzK0n7dAGd9gmGRw5XnSQsW:Pf83p8EdAGjgmGCxSe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 4008 msedge.exe 4008 msedge.exe 3412 identity_helper.exe 3412 identity_helper.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3216 4008 msedge.exe 83 PID 4008 wrote to memory of 3216 4008 msedge.exe 83 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 4020 4008 msedge.exe 85 PID 4008 wrote to memory of 5076 4008 msedge.exe 86 PID 4008 wrote to memory of 5076 4008 msedge.exe 86 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87 PID 4008 wrote to memory of 4696 4008 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e6ff2d84722d0c0558ee409fd283ce7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff925b546f8,0x7ff925b54708,0x7ff925b547182⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,12742290527463424919,9967983530079944575,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
837B
MD50e9969d0c8a43715532d4360bc6cfb26
SHA1d2865784ad8420fb542a3295bf11c5b3903bfa0b
SHA256c64cf6c2d5f72c0512fde51a964a4a6eb86e7901b0afa6ae91b637ccbfecc70e
SHA512c0c95694bd9ae8914d64674db0acdbf98582c96977890b49edbc9060f36b2a63f2e76a16730a027779758e953bee15491692a41f288364fea8ca6b007d966035
-
Filesize
6KB
MD5650b0500ef3ebc1cd09733fa73a9ba4c
SHA177a2988d15fc75078ffbf32475fc713d015de26b
SHA256eddde5ca572266c1a8903315c2eae3482e6161a9124007baa7c230cb2fb7a56b
SHA512bd691c4d7f2fe641a54b8a2a6fce2269a1e7ef7826f2928c1c02148077fb8eedcf70ea51f2f8fe968e4816fc880b429c4e637cfee657b370cb8f03d0c90b45cd
-
Filesize
6KB
MD55391cd85541b13c64d8cd68525faab87
SHA1b7ddf787c7defc992a68025ceefd0f8de5a890a0
SHA256c767d37a65a9aa1ada136f201df0b2ee7b9735a0d3feb6ce79399a3f86579470
SHA5122f14416c6958fb4e08321bb6688d48cf0ec6bcbf59a45aea6ac2e8cda03b61ce11d0e39e86c4afc29b92e0cfaed8ea349b6ee1d9fdb394f8b0a2180b357d6b1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51dda564aedd97bd28e2dbb1b528cf2a3
SHA15cda599ad167d38d291cdf2e73e641c4b0487688
SHA2565e95ebf55f975f9b007b12c0286f184faef1933955159e09ff56d66d216d3c42
SHA512542706cb02ca46a32af89e383cb9e978675446155891d15d88091e144cdab70eb70bcfe14fbe0bbd189543ba396edd892f7c5e7478cf5089acccf86fb7f95dd0