Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html
-
Size
62KB
-
MD5
e321fbf0093d6ae4bd9a5690b5cc7664
-
SHA1
2c2b9cbd4019afc25c4de3eddfb595d793942990
-
SHA256
e026839be9d115447d3dd557cd9bc7c5b4fd32d874cd4c0dc44e3862371ba717
-
SHA512
4ece16a32caa2f556d34ae3f53defef04a9115fb7d6755d662785ae08ee82dacbf002a65ed7e7634223dedd7b85a83023ef8f965ca79ccf07d0973dcc044382f
-
SSDEEP
1536:MB9hPI8l+n+M6qvWWuWuerQy5+QBczcAZta1:Ur+n+M5v/uAF5DMZta1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 2308 msedge.exe 2308 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2364 2308 msedge.exe 83 PID 2308 wrote to memory of 2364 2308 msedge.exe 83 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 2648 2308 msedge.exe 84 PID 2308 wrote to memory of 3244 2308 msedge.exe 85 PID 2308 wrote to memory of 3244 2308 msedge.exe 85 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86 PID 2308 wrote to memory of 1784 2308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5fa846f8,0x7ffc5fa84708,0x7ffc5fa847182⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13300176837204686908,14734067535238242577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
1KB
MD5a2c3f52120dc4a43edae88037846f148
SHA1af9cc2c7184684e64bbeef018139ab1534519cea
SHA256c73ae778667357017f167c2c4db7bc9707f78affe146bdfcc3e7a5e5c382640c
SHA512aa09b89e7d161615933c38c3ee2b219b2876030ff1c678dcd1b635226ce55a71adc71a8b2a750ae7c603f86c5dfb2250d83c16cd6ed15e3d54a7b3c30067db95
-
Filesize
5KB
MD52b13b4b428bd7199bfe21a46594c94bd
SHA1c5cf32a52e0430bd8907bfe9e1cffe6ff6269239
SHA256d8fbffe18082aa6b1a2eb89b3d87cbd11e011e9f2580e1d70aa6380c149eb8fc
SHA512b5b9672e98e46b4bbb7987f1d082b8d5051956cf0e364238bdf885ba8c6650cdafa990d1f8d86eb517a54f30b045c0d736c57c375844a11585df0dfcce277daf
-
Filesize
6KB
MD58e0412525f564255bfe90413deec9578
SHA10b3cfe2546a764a3849fca9af35a085acc11a77b
SHA256ad406e02e307546140eb8da431f1b71b9b3afe46161ffdb43902309a470b6c1a
SHA5126b65d046070f01d3cfeb52a7de86e5ae13dd5bd7d352cd20144d8164ccfacab8360624e4854c3135b04c714b2ee1cbb2e809d0022d0ea086b5b69bd9ef7def0b
-
Filesize
1KB
MD5bbece7b97cd8ba4b83e0dccaf2514e5d
SHA147ef8ea5fc8b54ac8a4bb257e99ef2080c985cef
SHA256ebf32a6192f860739951c97a51a1281a938a49bc6e51e0b53abe2cfb3df6d8d5
SHA512f9c82bbc71828ddfa239b86dbb239727a539925463a60477e4f87679b4cfa40ef18ad2d2c813a8e75813a1da45fa43850da8cfddb9e5b077a74f9b30eecfa151
-
Filesize
371B
MD5c1990e3e8b02d0903b93ccfe3f6c7ff0
SHA1ae81e29c30b3b9161db30931506a6ce61cd25615
SHA256a7a8c658711ad3c90280e0766c20f13aa0f62be87a532479c234b4c5a4cc9b84
SHA5120a09ae0cb6b3b8475c27e93d2f6d1633c4fbe1ad825c6c5c85ea5a58aa233ee46503294f0454a118a552d2a1735b3461ac1f0c2a766d08c37801b9d768f4548c
-
Filesize
10KB
MD59acc11450eba660740beb2cd0d0b022f
SHA1c6d0322dc8c594dc0b815bb570d585650128c30b
SHA2560ca5d26b39979e235ea5b83ae8d3767f441927e556b6c0603af76f7f9c4702b2
SHA5120e7699376ef3d818534e4e8772e2d72b7c39e71ab47d45754084a074d9f5b92014a9cbefd1bbc712d1c059520bfb36dd27f5b58b3fa2e02fa803486872cdd292