Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
e15afb789b4d7f8f652ec75e154647df_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15afb789b4d7f8f652ec75e154647df_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e15afb789b4d7f8f652ec75e154647df_JaffaCakes118.html
-
Size
158KB
-
MD5
e15afb789b4d7f8f652ec75e154647df
-
SHA1
63e8eb847d6f5b92ef3b0d9a4e580554f74df974
-
SHA256
87a39d6d009ad3d474c568fb0f123360c4bd6f116fd2822c1cbf9dde649c8ba8
-
SHA512
69247ec51acfd4fc658075be5564182059a9bf72543b5c2b3c7a0b4a85ddd35498d1de8e0cfc07f4a6bbedd96e6cdfcc51cc96493db71daa111cae8b347beb45
-
SSDEEP
1536:irRT1mAxtTr9qlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:iFHtJqlyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 2620 msedge.exe 2620 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3080 identity_helper.exe 3080 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2424 2620 msedge.exe 82 PID 2620 wrote to memory of 2424 2620 msedge.exe 82 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1100 2620 msedge.exe 83 PID 2620 wrote to memory of 1212 2620 msedge.exe 84 PID 2620 wrote to memory of 1212 2620 msedge.exe 84 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85 PID 2620 wrote to memory of 452 2620 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e15afb789b4d7f8f652ec75e154647df_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff866c646f8,0x7ff866c64708,0x7ff866c647182⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9227076670255135253,7956607245257980024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD57a6415deaed8d7f98429a49e15945ab4
SHA132d85a03a8d68889e8c9df76acf32f12ceca8f64
SHA256494d47557d62a8c62a738128a416c1d91ec16d1d38a9254ac3514534d8ecb561
SHA512adb68c903cf233174500d47c6d7d83e48c65fd796bef7763d08874f3e995228a3937510d770df7c12a1d47293c766f9ca1303275168238efb74663cbdf30c61a
-
Filesize
6KB
MD57aecd4dbc2f719df1880cf61ff7f97e9
SHA110e5e8aad61c4663393420e5d765714c03b38c07
SHA256c18a2f1c365a2c97fa07382d6f245358f9717cea680d19b369032a8b9cea5ac3
SHA5128bbf4d17a3dfe64e946874283ccbaf79158e7d91c0d96a477beb06851918d440cb5983928786ccb101e86cc49860b59676fdb7e42b593aff84b1b657469b5590
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57cbcf3d7436cd9a25545b213b123afe6
SHA13a0d9309b8aa4d633edc2ccf9a1d3f85b81d1a23
SHA2569d0df488b19ffa43aa99a217bd992633a2b3a32b7aaae723c6b306e65c374212
SHA512c9e6fa23cfbadaef17b23a32d9a5d489a5744ae1535cd82d011149948b0e9984d801c3221d1e6fb14c85a26a2c4de602e78ff957eed511543901299923dc341b