Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
2e12fa5a834fc647abcbc3feca1bde9b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e12fa5a834fc647abcbc3feca1bde9b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e12fa5a834fc647abcbc3feca1bde9b_JaffaCakes118.html
-
Size
56KB
-
MD5
2e12fa5a834fc647abcbc3feca1bde9b
-
SHA1
2edc37a069f6ebabde2ca637b7e3dec7be0e169c
-
SHA256
72381123d541405534caf4339fe21d1f7bd1df9eb6c8f57b439a808a76d72eab
-
SHA512
a78d878c9a8bb9af168b8e02e0b6f9afc9274810090773c4034e9934c75574481b218182f5e710b33484bbfff3335762b1faca67e15d6e08a9c6966c5828813c
-
SSDEEP
1536:UuvZVWQI95rhPBe5BepUeV9eZCePIviOkD5Ohe3fcCaFPzjpUWAfaDpcSh:vZVWde3fcNFPzjpUWAfatD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 692 msedge.exe 692 msedge.exe 3048 msedge.exe 3048 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3952 3048 msedge.exe 83 PID 3048 wrote to memory of 3952 3048 msedge.exe 83 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 3832 3048 msedge.exe 84 PID 3048 wrote to memory of 692 3048 msedge.exe 85 PID 3048 wrote to memory of 692 3048 msedge.exe 85 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86 PID 3048 wrote to memory of 2608 3048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e12fa5a834fc647abcbc3feca1bde9b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce0346f8,0x7ffdce034708,0x7ffdce0347182⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1000632211400851065,3299641228746266979,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
245B
MD5c339c650ff7df4c374b206d0ee6d3a2a
SHA1742ac917076fdcc0c393e177b26b6ee200f903bb
SHA2565c51dbd49fd6ab9ca2fc2f7f244c5ad55650ae686feda46c8512a09c9128c037
SHA512c59bbf82e02a0ebd1d0dd46d693fc9c3a1b76d7409fc55a38c38a97f94381662e80c72c562da50ad56d33255e139abb6d24a2635d996f11862136ebbc9c746a9
-
Filesize
6KB
MD592e8db07a0b357e840887ac1b62ee3ff
SHA11df84e79c48393c9dd0ead06f08852977d26eabd
SHA2567e2ed4830326353a25f8ba09af68ad5071e3efad62987c9007765a0f043de8dd
SHA512e51199f52920ad842be755f1a19386559102890d4a5eb08745df47cfcc03e3b183215594fb742216576a7defb17598773ae19471075415cd3eac783adb31a099
-
Filesize
6KB
MD57b3da22584d051f0928fc1eb0e148d30
SHA13371c2075b748458bd83d9d4ec0102536460678e
SHA25633b6cf706bb11fec52d820dfbbe14608255f2cef99071eb216a7d38c900a9daf
SHA5122196f55507d4987f83283a2e227c85adcc69cc5700866468a143e68850459643758c70b94253e5745f031cf3c4d6742ee298419f0e40a0a1ff460d3f28b59611
-
Filesize
6KB
MD5307db52d5fa502a0de80c70c4dc2bcd5
SHA169074d9d8f8d9c7f13a79205960d00c5bdb2047a
SHA2565d737d01ab4a17c8cbca7ef8f8221ea1143f5548af0559b18a0fe74bda80d987
SHA5122af2f8e2ed561cbd253b475506818cfd21e6f267f453a723bb8e33753fe347cf52ad1a7dde560d2e8e14c0dd4541df0fad599c2b92f1dfc39fbbbe91b01eb1dd
-
Filesize
204B
MD54d0cb14b124aa9c3a9e9e789991e156b
SHA178501c31400d3a2b83a6f04e52a31e2843ed8734
SHA25686439a2910aaca2d7a9a7eb17ad6e740d20c71eda65528c3a9aab7dd765af05f
SHA5124b51f3d6f89452a99596c99f1135adb3eeb8e1f25998f09cda91975254e8dcc88738f6325a17cca7f0a7a22729ab7e854b82db9ced18b8362bd03b3282f10c26
-
Filesize
204B
MD5611c5488be34d4ea01b42abd3b53e73e
SHA1a4909ce6136156c79fad657766784cc57b8d044a
SHA256d01ab2d8e183ae9daa4f1a42352c26e6c53dcb7167b6735f4184c4e4a2798762
SHA512590efb5b9b300a6268b464541c20192d44b24673a1feab046e72a009c85abd25795a51f5501f7836c290c8d7c67984fdeb119b6aba89abc5d57fe1d0a74b8362
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56c57d82673a60a56d8dba45bc485f83f
SHA17edd35601931b4c5eb98bf2e6c9556c24e846975
SHA2564369f7453ffcf996b73b7cc1fa837cefa31fa0d09857af345d6e0d6ae5e6fa74
SHA512f92ae4e0a10eeb32034fb7ed9f5538b2f815ba09c8c723a66efb52256079fd86afe17d05ccf7adfbb66018615434d75d4c5ccce8312c9da9d4135b10c2c6d219