Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 10:07
Static task
static1
Behavioral task
behavioral1
Sample
e5e0e5b212856173ba9719bbdbe2ccf6_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e5e0e5b212856173ba9719bbdbe2ccf6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e5e0e5b212856173ba9719bbdbe2ccf6_JaffaCakes118.html
-
Size
159KB
-
MD5
e5e0e5b212856173ba9719bbdbe2ccf6
-
SHA1
3ad757e93ef42bd4451f3b03d6b1ce6498fd047d
-
SHA256
9e78812cd1974201dc00c84beea1c28fad1e17f31fcb9ce0f9ee4bb3feb6a5e9
-
SHA512
c9be207d2a6e5e0da8acf913d12eccf147f7d37a6ad83b4e25f50d92817a901de6fc69f025291b9040a24b2566e351b34f5bb3f268009de18a7d9a673190ecb9
-
SSDEEP
1536:ivRTbe2Vq3zyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:iBbq3zyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 4668 msedge.exe 4668 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4568 4668 msedge.exe 83 PID 4668 wrote to memory of 4568 4668 msedge.exe 83 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 3124 4668 msedge.exe 84 PID 4668 wrote to memory of 2516 4668 msedge.exe 85 PID 4668 wrote to memory of 2516 4668 msedge.exe 85 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86 PID 4668 wrote to memory of 404 4668 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e5e0e5b212856173ba9719bbdbe2ccf6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a7b946f8,0x7ff9a7b94708,0x7ff9a7b947182⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16798343301830548034,17875547828416022831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD5d9bcd6e8afbea22511d8b232e23fb760
SHA17a212323a708ecb65d08b9c5889c1387c71ab636
SHA2561dccae6f7ec3a8375cd32364ba7fd444118dcebe62407f3b4bf2b277bb1c96a5
SHA512d1e438233df09e91a9c2c8be7ffe58aea338a06167f9b61d58476736f61cf6657e342e103e5b314e714ef2be63d4b2b47dde40995ed37d5492b4f8fc92d96f24
-
Filesize
5KB
MD5358f2ed20d8971667e74c2b9550a4535
SHA18e8fa1f8243ec7d3339c48cf851994b946f370b4
SHA256f807d1b994225e92afc164460977da5682d43d7cd05bf21c13a7417105cbc7d8
SHA5128a38fd7b6bdce1daf8258ed66eae1ce0220329895811e0b316c865d568a3108349d739cbff9d9454c910b70afb7454fec321e86e9d95d38c4c84ebf4d5ac4c37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5428c3000380ea5e3a1871383f867f517
SHA14f61493f09a15d472265a219c95d46d4b725dad9
SHA256199e997509145caf87445c2cb0769a6d8b279650fee9149ac79906150cb2d2c9
SHA5123196a86091cc062c8a29a41a0d13ebf83b218ea116bfc2b4c78e7047ef758dfd9109800bf0d5990fa3a1316afdd3a4b3ad471a3e504b3116eb832c625f58f4fc