Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
e775a4b923b7311cb21058c7d20f58b4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e775a4b923b7311cb21058c7d20f58b4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e775a4b923b7311cb21058c7d20f58b4_JaffaCakes118.html
-
Size
157KB
-
MD5
e775a4b923b7311cb21058c7d20f58b4
-
SHA1
9de74461b094ff44b94a4ebe22940109831a0fb5
-
SHA256
0d7e207cfe0be84e830028c160caadec7cc840721a22836ccdc3df226041e758
-
SHA512
9145bc7c106acff26639a68ce132302e1bed20dd7fb25d2dd074915508e0bf459df5c28b03b183384ed5a83e00d718e68f739a376b1da0cf081e924e31457f2d
-
SSDEEP
1536:i5RTA4y3FbLXYUUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:ifMFPUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 1716 msedge.exe 1716 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 2644 identity_helper.exe 2644 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1328 1716 msedge.exe 84 PID 1716 wrote to memory of 1328 1716 msedge.exe 84 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 688 1716 msedge.exe 85 PID 1716 wrote to memory of 2628 1716 msedge.exe 86 PID 1716 wrote to memory of 2628 1716 msedge.exe 86 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87 PID 1716 wrote to memory of 1596 1716 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e775a4b923b7311cb21058c7d20f58b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8e1246f8,0x7ffd8e124708,0x7ffd8e1247182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2401646004227409578,3497204304004186762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9571a4eb-3b10-4319-985f-2561da96ec20.tmp
Filesize5KB
MD56b9b4b15e727f47f593ce3633acf3f8f
SHA133bb03be34c79c53e3a83bc4ad0243c569717897
SHA25636ab7948066974fa6b0f7078c5cdb9374b760a00b3e8f76eb52eb5fb7599d4cd
SHA512942bbdb7153d7a5edc778f1bb5ded23fc636882df71bc52ba4b92a16b6d4f3c8dcbe48c41cbee25a40df57e019c32cdd539ca3f2010dd170b34670e2d696b881
-
Filesize
6KB
MD52887c845041de9ddc045f34f35edb041
SHA1fb6836319ba23d118bbb84338a434dfbc5c4a73e
SHA256f574985b8a8d223e4570dde3644bf7190ea6cde30153454b43ab96f5ff64338d
SHA512394709f2f3d36718e85f93a2795bf4bd51cd5adfcc5bc833f1c444db5c2b7b107c8a52e031a08f343ff6d9e8fb5ddbe913315dd9e6cf7559955e2a6f31ac7dbe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50320f66adab2ae8a6baca2f5863306e2
SHA1b83ad3471c88c1eb1b80fcd32d7d48d172681347
SHA256fb765d5800c9ba35d232d5769a25669e0711b0eca26c0809459a68bd11b013ff
SHA512aba525361df4f881c0d5d34356c0ebacc030ed703ae15e589eb01496dc39c915084ad5530bd578234d5ef9fa4969484211b0e1c8364ef0e738a5643c43e40518