Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
e11b9d0aa8bcf79b015bc562c8e798c2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e11b9d0aa8bcf79b015bc562c8e798c2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e11b9d0aa8bcf79b015bc562c8e798c2_JaffaCakes118.html
-
Size
144KB
-
MD5
e11b9d0aa8bcf79b015bc562c8e798c2
-
SHA1
ee7ec66b4fd7b0721a4c601e6794e0979493204a
-
SHA256
181fea5a3295b97cc643d8b3eebfc7e94822b31d8901ca47b3522cf4476c9882
-
SHA512
c697b2271b93fb63b6fc12aa7392b32d08fc7a21d947c58779500f7a2036e2e528c4a8536f8dd2ebbeddc41762b2fdb75fd47f67e50193dd8c325df75f6c6075
-
SSDEEP
3072:472dpnhTV/cOWd6bJr6KGCUMvzM+FDCKs95q1+K3258uoUP+tOt5SphjpYGQvq:4Q9kOWgNr6Po5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2832 msedge.exe 2832 msedge.exe 4236 msedge.exe 4236 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 5116 4236 msedge.exe 84 PID 4236 wrote to memory of 5116 4236 msedge.exe 84 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2644 4236 msedge.exe 85 PID 4236 wrote to memory of 2832 4236 msedge.exe 86 PID 4236 wrote to memory of 2832 4236 msedge.exe 86 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87 PID 4236 wrote to memory of 740 4236 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e11b9d0aa8bcf79b015bc562c8e798c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81e1e46f8,0x7ff81e1e4708,0x7ff81e1e47182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,15535526311874484094,13324192871068087047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\549915c7-15fd-49ea-9a69-600aea5610c7.tmp
Filesize5KB
MD5b8d3f7886dde647f331770a7cfb5c27c
SHA172fc1df304cf9afd83eaf32ec715f6c8746a27cc
SHA25672f56621c115f81117178862c524d28d5a6c7f24d839c0a73a34810e7cae647a
SHA5122dba8172b38152e8871bf3f11e580d20ac0256216c644eb3428bc8e6e435110a3d5fa13a6f29c6bf0fc0ffeee818a7baa44e9b5159d2670caf1486e53a43ac14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD55058c9ccba927cfd49a9876ef97d3da9
SHA1804ccb48b9772548d405d052c0d22800c8d24fb7
SHA256c8377ec6027322a7aed98d3b0fda816a920c0de723e47ed3f23973c9c3def0a6
SHA512d7089ba25f7c668cb51ffddae2850013d7cebb86afa4b24b5757ac40eb47a1664b4562ebd068faad7eefd1d3a28a1909f08b4757f29ed7c710db2afbb2b39174
-
Filesize
1KB
MD50be52a6a3c2965fbb659f409d50b6a1e
SHA123ba56d00ed7006629b32df80f1d7ceff220c1c4
SHA256f07b501bf60069443213b3f707df606771eb5125cf9ae597cf7f1386625ddc8a
SHA512216730906aa3c8e89984e668d42dac787c4f180b78073f83ce3a03e378d20c969ab24da0f29acc0122869ae5204eea23a3c749b81d75bc9caffeedf9f75f3672
-
Filesize
6KB
MD5e2122497a64679f66ed8b76aace90f7e
SHA11e8f04a10aac50ddb140f2bb2e773ad92d75b32b
SHA256cca8524a1783f2a590dc9cce514f7602181c61711d6c9a8dae4c2204314d40f1
SHA51292f8d6feb36d213ff48c8e2a58b08e787fd98da707eca55b1ab04657d5f4769ac252370030913f9dff3eecf7ae799c5ce211595069163d5f0bd6c5406abfee2c
-
Filesize
10KB
MD58c5224920f0a928a773e86cbe022c1af
SHA19677741c487a491c807dad67a7fc60e6bd0988ab
SHA256a2a20f14b9287f69637417eb5c488a95e9b50937d32b6869ebf93ec248caf5fb
SHA51209fd4b429bcc06d4ce824f4034d8f98ebc287add964023112fe2b99aee2c4102f1fd97b697e46f27fe6952e4387f0c8e50a39cefc4b67c28d5ed72dcacf7fe48