Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
e53f917a0d2a11606d40a846bae023d8_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e53f917a0d2a11606d40a846bae023d8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e53f917a0d2a11606d40a846bae023d8_JaffaCakes118.html
-
Size
156KB
-
MD5
e53f917a0d2a11606d40a846bae023d8
-
SHA1
ed178f9e4612a6cce591302558d3af3edc240807
-
SHA256
18514be4a04c90e21b82bfaee7f7151c5d506764e4401f49dc14af03dd467642
-
SHA512
d0be346cbba41c25cbd23f971d042138cb795c1e47d222e1c797933305eee825dd1f69e0da39beaf418054b44c9c781d0e12c1efe5c8a4542af85964d95e73f3
-
SSDEEP
1536:ioRTxDyQPJ3ebX6eQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:iiHBfeQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 2784 msedge.exe 2784 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4212 identity_helper.exe 4212 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3160 2784 msedge.exe 83 PID 2784 wrote to memory of 3160 2784 msedge.exe 83 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 1716 2784 msedge.exe 84 PID 2784 wrote to memory of 4472 2784 msedge.exe 85 PID 2784 wrote to memory of 4472 2784 msedge.exe 85 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86 PID 2784 wrote to memory of 2856 2784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e53f917a0d2a11606d40a846bae023d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8983846f8,0x7ff898384708,0x7ff8983847182⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6583647954268788776,7691758542281629762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
5KB
MD5e8b07e8693e86cea509f51cd61d0e0f1
SHA16915eca3cba39e59a1012284c542afd7d0deb0ec
SHA256c87a1ae68f79a4dc68107a7f7c9c44fc08ccaa0a3fa7599d8b78ce3a067f2511
SHA512e31e8b5114db39775b8ae849f11ab2840db4260bf8c9e7a7cbaf7669934fe7e530cc70caf91c2d5387689c720d43e9800451a0311fcd0c6271ad04475059a532
-
Filesize
6KB
MD534ae4785e43b829f183af3e4890de339
SHA189f199daa9809904ff7afd4c66f5a2d0e1c7bad1
SHA2562a1fb92a7be1ca163aedd2ab5c660076cfdf49256e4c2d41913880efd0b2be8d
SHA512572b3cbdeef0f6937b2fe1136766435f8e1e2f8b48879a172da4df7fe3639c44679977d1507d5cad6ff783758aa0dd65a0fe11e20dc6cb35954d5f78e1e08970
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53a782a0cca67f0e136912e7e55892a66
SHA1de7e1770766310889419ef131f0c41e55aa2039a
SHA2562bb4218b824b81fa3ea2942144e605a0b1a8d40968680070ce163f80d669db7e
SHA512e9f4153a1648a6676a518b1244748dc0c6d2a5ca5af3d2a7deee10498dd2b234b35ab643fa96bde753e0f339c0bf2fb08b20b007f2712af418317e19fc791cb7