Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 16:41
Behavioral task
behavioral1
Sample
e7509e4e327215dbe8de7b22039a639e_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e7509e4e327215dbe8de7b22039a639e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e7509e4e327215dbe8de7b22039a639e_JaffaCakes118.html
-
Size
100KB
-
MD5
e7509e4e327215dbe8de7b22039a639e
-
SHA1
3f49a79078a42e24860efd07f8dd77c85a620adf
-
SHA256
b82d29ee10181209c5e02e6fe11ca4ed4bef4a35120ab64d2fee20aac6616595
-
SHA512
6c5f19dcab523a3c7b3b8f9cc814b204babd654b8758271c7ee31e1f211a9f5f02f9e1ff5c3a41efb7a1fb03b8fe19f68fd44626f168172f6e6f230543ac94ac
-
SSDEEP
3072:GCA/4W+j+NHasslRNodphf/88sMrXV/qgGcUNZ2Kj:GCAu+0sslRj5uiZx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1488 msedge.exe 1488 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4396 1488 msedge.exe 83 PID 1488 wrote to memory of 4396 1488 msedge.exe 83 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 3852 1488 msedge.exe 84 PID 1488 wrote to memory of 1088 1488 msedge.exe 85 PID 1488 wrote to memory of 1088 1488 msedge.exe 85 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86 PID 1488 wrote to memory of 3280 1488 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e7509e4e327215dbe8de7b22039a639e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b7e846f8,0x7ff8b7e84708,0x7ff8b7e847182⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1384 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8701766977310043271,17778158214730447297,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5a7ca906723ee3af6fe381d5f21859124
SHA1aed328a48f0bff29c20e014316968d74cd837ec7
SHA256bf38069d594bd6d4639adac88385f8e8d014a6506ad1c59139842e8d409317fe
SHA5128c320d8216ffdeec20f46a701cfdf20111d840ea81004288bffbd6f8b73eb8b243c81911387e543ee74d5c2206797e73d79d01785a95b55c84258287ee9dd1a6
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58562d1d4a1e27eceec5212388b26a53a
SHA121f70ed7ed886e82be08c73e76e39e72ae4b9a7a
SHA2560a1b70ff2e11880f7f7c1e5cc39d4aa0b47a27aa2ed38cfca2b343c4cdf2deee
SHA512a42a1392dd3ced02bff42ce680a637b3a641f74c131e69631ac5fe507aa2a7af8bd26c2abd5c063620c9e8cd502b7f32738b52da0b3c94a1e713cc167ad60634
-
Filesize
2KB
MD5206b504e7ddfb4c17d27ee4dc397c65b
SHA1ad865c575ca891bb3d37e8e45935312bd56f693c
SHA25650384ead382a181fbdbf185e7b25120aed6926a22b6850dfd1468501b009538a
SHA512fe6a0231f7bbaab5e6fba30b3c192a14e6e283f19a30a5afbedc49039c80d557f320df0be153e2bd4d1b372dbcf921be09b582273d113f14897c2b8d68fd780b
-
Filesize
5KB
MD53796b53db6e6856e69c32c10e960f15a
SHA10cfd07ca98326addaacb3bda7907694970691b5a
SHA25659161ef4836cffdd5b996a455473dbdc6eff80cf5b8fbe47744c1cdbaf762b28
SHA5123af51f03dc4860dec2544e55680846e263ed78286282595160704496396fd1369637fc6786674449cfabd2e897e663a4942f189e0dd61000af5345dcc7d0813c
-
Filesize
7KB
MD5d20a36e47aceab44fbddb7db221594bf
SHA1b8d96a9a0300ed4f3c2a2e0de1b5cf2a96e33f66
SHA25661c291373d6b5817f8b6cdca81633f909977d7148f780af931f34aff6055f81b
SHA5128f0c0a35a2e9fda02d3bcf4f75ab03222b1fa7fbf5645230a3558988d91f777dc78e23a0b2f993e07ae72b87c405edc37c091e5ac06ca0fdba0c8b7b3afd5036
-
Filesize
10KB
MD510c95582c6dc6f1909e25a6f64b85f55
SHA1b971bb82b03413aee5839ef228cc99b725345825
SHA2568014e3603dfb7b5d826afe36efc1618e31c3c679c9c364b09e3853402915f547
SHA51294e26602c687c4879a7cdad9ca8c586b932754c98e4f576e2fd87e4bafa28180b3a54181da029387c316ef121ddfe44246da2c05e0d90919dd98bf810cb994bb