Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
e57430d4742d3b0a6cb4de3dacfbe58b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e57430d4742d3b0a6cb4de3dacfbe58b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e57430d4742d3b0a6cb4de3dacfbe58b_JaffaCakes118.html
-
Size
76KB
-
MD5
e57430d4742d3b0a6cb4de3dacfbe58b
-
SHA1
ab103df720ecaed511517364a22557a7132ff6ab
-
SHA256
bda7642bd2b7f1a6226fbc9d7bd74e3c721447a26de59a79871a2ba6be79ccec
-
SHA512
ce02420e0b12192a566dbbf592b65d84b293e5ddf9810f582ac34de0bea22775d20c356280b8d95726c424120238cf38e2149489f791ed14087fcdcb735d052f
-
SSDEEP
1536:DcXd8KBjmoNpTzQxHhM06AGFCjB4hY+BSIqyg5QvLgRkcDiIFWh:DZKBjmoNpTcxHhM06AGFCjB4hY+BSIqw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 548 msedge.exe 548 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 3168 548 msedge.exe 83 PID 548 wrote to memory of 3168 548 msedge.exe 83 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 1732 548 msedge.exe 84 PID 548 wrote to memory of 4992 548 msedge.exe 85 PID 548 wrote to memory of 4992 548 msedge.exe 85 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86 PID 548 wrote to memory of 3520 548 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e57430d4742d3b0a6cb4de3dacfbe58b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac5c46f8,0x7ffdac5c4708,0x7ffdac5c47182⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,6636907917913770643,2265607184317612227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD562cc1dffba3923300f2705bac57ee880
SHA1a2e473def514ba48a19c3c8b00c1e02de0c94dd3
SHA2565349f167c942c7ebfbd9bc023e8373633881e267d6059fe63c4b304dade3cf90
SHA51247628acddc2b8565ce249e3af823f8647564d13025c553fe82fd407e6aa3d11ba316eeef629e0aa7150cc368f8ce06aecfcdd7e830a4bc1e8442152d08d3cd35
-
Filesize
1KB
MD52a8fff968479e67df354423074f770d9
SHA12c77dae8d0855a1ad5c7395f28772c80f7f93c1a
SHA25618dd786cb8e662ecc5767d1757b616d3a90223ccac31d0870010c71a5b218db5
SHA512815e737ca63174fd20509be8c37df6151bb284f44b73581361cb58d6269f7fe9653621ee636509169e409acc675bd8ee16a708ca6bdb6c2b4c7387c715c1b9f9
-
Filesize
5KB
MD5efce35ae36022de0e60e3299f47d7147
SHA1d9b9e33e6964ad9688ff928fe4563c5d637c6d9f
SHA256dccdc5442423babad17203f88a9cd4635ddb367b2907b0c388d075d70593962e
SHA512af512a0911b61859e4d9fbf20d3af89a56d8ee189c87f2a406b39e5fae87ae829e5e616c2ae053d34a0cdf47c52aed015c2e520d45cf64ea23b2b02798c6be6f
-
Filesize
6KB
MD53c260738b1933eb17ed9d6cabc0f4ba1
SHA11bdd37921fb90cb64eaee2d77e3f25a8fbbdc9ed
SHA256376ea37b5669a2a33f0cbb1205b09b33bd50164a41ab89ebbc0c15df165abeb4
SHA5120b3c3c07cea7edde3e1dab9f37f15ec319f5615676cf27de685f9da895fe8e54a476a7dccb4f20f9a6b2e4ca7efbfa5bfdd671b57d11b40482ae6572c3872aac
-
Filesize
10KB
MD5e5a904b7520267a71a46a5213be6eb93
SHA122a0249780a2eca7c04aecfdbe39e6fdff33819e
SHA256a7f0decf86f8518824f8e918adb5f99d1ad8d8b1d8dbcdec12a4b11152a07c4a
SHA5128bcfcd5e5b9c6559a08f176b7ea67c8d97e7f160c0cd16c13badff9270a17e787e63919cd8c228d2dc0f439ead04f325b4c7c8c231fcb3c677575571fa876c66