Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
e16982afa3555f8739316358388c4a7c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e16982afa3555f8739316358388c4a7c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e16982afa3555f8739316358388c4a7c_JaffaCakes118.html
-
Size
116KB
-
MD5
e16982afa3555f8739316358388c4a7c
-
SHA1
dd08959240397ac8220698b7a9d79d63fed15590
-
SHA256
41656406b02eda8d4b644155c201f7c4318078a8d0c705b19cbffe6edc80558e
-
SHA512
f73ecc384e35763c0cecd97f762fb06916f2a20ff60ee2d44c4ab843f3f5cc8dc23b16d1a2fd00e5eedbc003a30ce5b1a1c0acec6c9c9cea47049f2fd71a1519
-
SSDEEP
1536:SkhZKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SkrKyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 3128 msedge.exe 3128 msedge.exe 2108 identity_helper.exe 2108 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 4012 3128 msedge.exe 82 PID 3128 wrote to memory of 4012 3128 msedge.exe 82 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 4836 3128 msedge.exe 83 PID 3128 wrote to memory of 1416 3128 msedge.exe 84 PID 3128 wrote to memory of 1416 3128 msedge.exe 84 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85 PID 3128 wrote to memory of 4888 3128 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e16982afa3555f8739316358388c4a7c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9dc46f8,0x7ffba9dc4708,0x7ffba9dc47182⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1356 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9191223031135178155,12047698102366250852,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD58b7b7b2a09e58a81a0b5b13e0976a3ea
SHA135d4d9840ee2db11ff73a9961fe47d82ed539a71
SHA25677809d30b6452254f476da386c83056db0dddf595921ff68fffb8e7749ca3580
SHA512621d0f03704e64519801f74a80437ac3589eb64d565d0463dc87be86a90fb92832822daa12fe56a13a7501442cfacc4521eb7be6c37e208ef62ed910258a24ae
-
Filesize
6KB
MD58eac7ab4f2cac6fc55a2080b99b4cee8
SHA1ee67e0986f5219445c1ff8d7b0f2d00670410715
SHA256dd3fd7d6e3c3a4fe6a1cb10a3db34bc71965297e52e4927fd4c35717581a3f72
SHA5123290ceacbb5e94bba1ad6f49cd22251d20315dc95442eb201983adbfbdfc56752975485bc667bfbe476f25489e5d6a5ad0159e860c8adc08a4ec7b54ff9a6712
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e072d3c185f093425f46b0d8f2e38898
SHA1bb39a2142db304c87fb7d82a651101961db8c47f
SHA2569a591df9c0d7da284c057c0b7ab9918428975af76159b7ab53e9affb491f3431
SHA512ff912297dee3371febf2d5adeff674b0d1cf9dd116649c3641f7ab983a4888abc3fd80bfe7d383881839b66f35553521e617796c8807b2ffb4195cb405d6d988