Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
e0319047d28c12c2c632457aca6632c1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0319047d28c12c2c632457aca6632c1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e0319047d28c12c2c632457aca6632c1_JaffaCakes118.html
-
Size
156KB
-
MD5
e0319047d28c12c2c632457aca6632c1
-
SHA1
d204899c639d5f6faffa6efc34ce2a4b99808cd8
-
SHA256
f33e2fb2ace4be0edae39a34cf93b0bbb381356854f0b9999c2f1d67bf0ebf8d
-
SHA512
71796e38931387a8fdc8383705a39f0125652f780f040c54b93de035de30de16334a3c4b6c776cbc657e640114f9b7daae543f7aa2f253cd8be7663a62a06a56
-
SSDEEP
3072:iV1hfnpQSyfkMY+BES09JXAnyrZalI+YQ:iBeXsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 4416 identity_helper.exe 4416 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 5048 3356 msedge.exe 82 PID 3356 wrote to memory of 5048 3356 msedge.exe 82 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 5096 3356 msedge.exe 83 PID 3356 wrote to memory of 4516 3356 msedge.exe 84 PID 3356 wrote to memory of 4516 3356 msedge.exe 84 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85 PID 3356 wrote to memory of 1480 3356 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e0319047d28c12c2c632457aca6632c1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda8d446f8,0x7ffda8d44708,0x7ffda8d447182⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10268102129680879615,4234132821497492276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5267a51f900f914e7d5848e6b40ddf235
SHA1505d2c0692894769cf958e6d8013e4634117300d
SHA256842ae2dada6d3aae8c49c8052dc4d36bef9091c195147a9ed8945fbd161eb959
SHA5125f34c2a97ea7aa43f8b9ba080d7904694155ebcdbf6d758e2df3d74d138ff30ab65798049195e3a83749326c8d6ace33a75d9f057c8b1de7afd3adb3505beae9
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD5bb54de8c8795579d13de26eac4de70cc
SHA1baa0804e3de1823e81959501a2950d494a1c4d77
SHA256fbcda1da504a708f6ccd27cd443fb84fa7f9b9efb056b14c77bd5cb21bbb96f2
SHA5125b2b1646fb1eaa5c1c397a931f412d5472e963481ebb0fc8de01e15e3f3c8d8bc9a527432ad7cd6d98b333b8cd21ddbfa1bcf293d9b1e766236a69d335ea390b
-
Filesize
6KB
MD5bdad1088440cb0d255a861b023f81380
SHA16e3d106b23e0c3b7bbdcf254a656c6b6850f85fd
SHA256e0619228662b8f872622db8e9b5bacbbc284cf0641bbc538b078b38002da4ef9
SHA512ecbbeadc749b14e5a409b930cb8a6ba5661e6397dc14f751b9b7368009c28048eae609a2305ff06d951b7060509110f20dd818faa897975c3712130120e13962
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389