Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
e06caf4ec191b355ea2f71e652e23f39_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e06caf4ec191b355ea2f71e652e23f39_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e06caf4ec191b355ea2f71e652e23f39_JaffaCakes118.html
-
Size
2.3MB
-
MD5
e06caf4ec191b355ea2f71e652e23f39
-
SHA1
7aee2b3b18b9a0632775ca136933e1d864c7b492
-
SHA256
b5586ceff8b79de7fd4489b8e619046bd90398b6b627f21e8f92179d110c9054
-
SHA512
b7a249706f117f51602ffe066617d6a9ea6adcbe06979717b0a38dd467366f9590b4392615ecb2ae509cb9be07666526880587d66a30c9542cb5ab63ddf94091
-
SSDEEP
24576:L+Wt9BJ+Wt9Bq+Wt9B9+Wt9BF+Wt9Bt+Wt9B1+Wt9B5+Wt9Bi+Wt9BX+Wt9Bz+W2:m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3116 msedge.exe 3116 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4264 3116 msedge.exe 82 PID 3116 wrote to memory of 4264 3116 msedge.exe 82 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 4068 3116 msedge.exe 83 PID 3116 wrote to memory of 3380 3116 msedge.exe 84 PID 3116 wrote to memory of 3380 3116 msedge.exe 84 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85 PID 3116 wrote to memory of 396 3116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e06caf4ec191b355ea2f71e652e23f39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff866c646f8,0x7ff866c64708,0x7ff866c647182⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4304 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7126956250986994461,18424357953763806382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
318B
MD59c51bded6163d805d2bd7d5608727705
SHA14533ef7fc4600102cab659bca10c455376ef6d0f
SHA2564e1ad5626d3e235f3abfa544d4ba31397cb74f05d3bb5c9fa3de3c074f9949ff
SHA512d68e6277cd383cd32a103e46a8a6f195104e15535828d7952f1b7370281c06a5a66ffd8c339c6c8d7760c49d688d472f09478a5bc29da3529d164631c6ad05a9
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5dac57a393ce3bb94a9ed28e387764b37
SHA14ac0425616265b2b632a4b15275cae80a08f3058
SHA256f64d1209bb7f5bcbe99cc2949febc16dd17eb800f0b1030d3e50accb78233f98
SHA5128fb01e43796d231f3d48fd0c8698362d58ca11ae8efaf1ba716e21f9d486700b30b6ae55709cc317c6668b503cb85b2fb7524a82d389c9bdee0c784432203ce2
-
Filesize
5KB
MD51a0530ac371094117cf3eb9f4a355da1
SHA19e91fe64bf8b806e96f4283f1691d5cb49c594ee
SHA256234215f4536315fd3324d22b372982c5caadd62e1a136cb95531886eade0b6fe
SHA512e93935b27d2580145c746d3158157ee4ad16a86b9a846b762702f3f0ac1a1c57360a1658135eed629e45b8f3e1f2a1e4a2b21068b76cd955d2707882f29149f0
-
Filesize
8KB
MD5c9cca97b70b7646c24ea838985c335a4
SHA1d3f840a67a0fa7330d888b85f9001b1d8c471dc7
SHA256be84ec94b7b0742ee8f574e0274844a3355547829740314929ec264838cc0b6e
SHA5125b7dd31a8057c82297a1a844fef898a5c8e9c625687f2b032ef403312536e6efb867dcfe62fb9dbb401eb73a41506bcf2af944db1016ac237246ed290c9ceba3