Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
e0c2113b6df3bd5ca95d297654700a89_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0c2113b6df3bd5ca95d297654700a89_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e0c2113b6df3bd5ca95d297654700a89_JaffaCakes118.html
-
Size
500KB
-
MD5
e0c2113b6df3bd5ca95d297654700a89
-
SHA1
20248a0a894065a43bd0ba8f1aaa0b7fa16ebe0e
-
SHA256
7cb06946ceede79ea06c14df0939e403d141ad9ba2f71812a4edda0dbd65a1e4
-
SHA512
6e349992c8df17d5bafdd2d23f22968d02a8c56f65d4283e22f9a0f9bc59877a783d8fed0c4293616c9d8af8b7b18982322ddff31634de28477bb0d989f6f3ec
-
SSDEEP
12288:aEDIYLjWl1wNU2j3bKqDha2U1rmwSBq2tt9klLIVbyjQd+q+xdkz0WFu4q96LrMG:3DI4KPqv7uk8RNZg1r2xC+0IHbQhQbkR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 3744 msedge.exe 3744 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1208 3744 msedge.exe 83 PID 3744 wrote to memory of 1208 3744 msedge.exe 83 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 1128 3744 msedge.exe 84 PID 3744 wrote to memory of 4468 3744 msedge.exe 85 PID 3744 wrote to memory of 4468 3744 msedge.exe 85 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86 PID 3744 wrote to memory of 1344 3744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e0c2113b6df3bd5ca95d297654700a89_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7eb846f8,0x7ffd7eb84708,0x7ffd7eb847182⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2453008825839534078,12266059661470452472,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8e746e3a-4d23-4653-8947-101994ac1f10.tmp
Filesize5KB
MD52bfc05e1c60cb5852baa8dcd55a1def2
SHA170cd4cc6f7cba5a6e98c219da5b64df0c329612c
SHA2569b5cc3e0b04a8d976ef4da4ccfaa86f5c0437bd5e096545efcdc214d348257e0
SHA5123c129cb7d3229138b0c155c80f79acda056c84f2f8ecdedeb9a5aa88a3e4858b9d3b47049306b8b8e724fb2e962d327673260a8c41825f65ae334fc66ab27377
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD561c4f39270a71797e79b9b326173317c
SHA139a460abba127c903f38510d40ea8907a9cecef2
SHA2566b73c7f65d9da536bb7ef90724e90112d3cbdf7b45d0f12ba1b12d4a11b386d9
SHA512301d847d2e5911657d36c3de29e0641ab1e6d97a7f518b7885a42217fec18d43dc1a5dbc2a4cd25deb972535fbe7bf0d12897ab5d1bfdb6c740b4a98e76ee401
-
Filesize
1KB
MD511c3073ce1f1da9abe3fd1c4f5fe019c
SHA185e8a3a2f2b177c6bcef62e480467daf628e8c07
SHA25605cee33737a856f1b03457af111a40770de8450adea74aec2bdc6f09f839f232
SHA512cc9123495c4ab58cc153aede08bbbf9d4b362facafdb9d10766c1128fd9adf87f1b9152845ced955919dc2cd78ee27b613eaabcad5d90fafc776e41ba586a7af
-
Filesize
6KB
MD5c90f84a2b3329fbaacde8b8ed1a78c48
SHA187480676914c5c538ba6eaa7cc27d00a8b7adad9
SHA2567dca402b4672f4c030676174b1ec06eac07003e894a8c2420960db05c53aff60
SHA512ae13f14acc37ec1bdf1720ef887a1e9671213899e17bd61fd429769cf0afe80a1aa3a1c4c08127f8bfb4dcaefc5fdb4601a8c4cf93e9d5deecc0cac6c275ced8
-
Filesize
871B
MD5185610dc9a20be115743aa5fb18c34cb
SHA1000d13059fcdd78a23ad7b465207adf3b19a029f
SHA2560ead516f037ca8705cdf52d1fd2ef255710a3caf7238b58fdb40a95b665b44f8
SHA51251403927b111d74e13a3c1e0664e2009618a2dfa3619e235f28ffb29f8b6143718f3d2ceaf10c67b46fb822b7bfae833e74f15299f53ece4e9bf195ff2dc0c4c
-
Filesize
370B
MD5ac364859f532d7e7f52caf87d566a82a
SHA1a950b5b4a6e322eef856cf3c0db0900abc961361
SHA2561154ad24bd865d24a4aeb23f7d8b237ad03e08630b66987e021497d6a9bc864a
SHA512d2af7e7522211336ab42107af586d6b18ce1a489c2128437cbb42c930776c305cab509372732eae4b667ccd88edfbd82ad8275c1487d8110d67b2e9b948d991e
-
Filesize
10KB
MD5cd83e3d6b04d9b422a85c68a19fdc44d
SHA16ec2cce6532c5731154c643186e74224c28093da
SHA25633618f44b1d94b509ab0ee9dcc92c3440f5c3fc3c2bc969871224c2ea0a51cef
SHA512baa70741981b20522aa5dcb2e146641b2f05c412e94f7a45c3a1960ac604546ea4ee059166f1aec3b4f9a862c5e48db6bb15a7693884d4eac860938309bb7172