Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
e7aeacea949e4e727ae7efc5f459dc03_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e7aeacea949e4e727ae7efc5f459dc03_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e7aeacea949e4e727ae7efc5f459dc03_JaffaCakes118.html
-
Size
155KB
-
MD5
e7aeacea949e4e727ae7efc5f459dc03
-
SHA1
ff29a1a8a1887b0da3cc9c399eab17e8833ee66f
-
SHA256
2d639dd95a1b355d2900b93b4a1ad652b94a00ba572678b4444d17bca592bb2a
-
SHA512
ecde2e6d1749f3146abbf3c6850fd93780275a5b60ee4875004db235aafb50e60ae765fd8cb76641f9c322f52c0dc68869582cef0075449ccc3d09a3ee5365a7
-
SSDEEP
1536:iqRTHD/zBg+/4oyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:ioWs4oyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 1624 msedge.exe 1624 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 708 identity_helper.exe 708 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1560 1624 msedge.exe 83 PID 1624 wrote to memory of 1560 1624 msedge.exe 83 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 3940 1624 msedge.exe 84 PID 1624 wrote to memory of 1972 1624 msedge.exe 85 PID 1624 wrote to memory of 1972 1624 msedge.exe 85 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86 PID 1624 wrote to memory of 2784 1624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e7aeacea949e4e727ae7efc5f459dc03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96a2446f8,0x7ff96a244708,0x7ff96a2447182⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16092854874235921321,16228317173218269200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
5KB
MD56d222737142384a66c6f0060e22ce01c
SHA12370fba0a0586fc1a294eed62b90d6599fa8a80b
SHA256966d279e492eb6d4f83ef022d02d2960e0c40b0b2b89db853418b4b2680f3519
SHA5129983f1addbb5dd4356a9761728774a9727aeb8682b41401f4e44134bf61202aec3024b49caf8119846198da3ee4fbab52b786042b409c301987f386e18999946
-
Filesize
6KB
MD559516420a5e289276c376c140bc925e6
SHA12adb216a5ee4f88de8c17f16878c6c297ed482e4
SHA25615041b54aa738ed64ea1d741e9763fca8a48e6577b66242dc69d4258f2ef144b
SHA5125f4376b6b25c830cf499d59765c779c58c61bf319abede14dc5c88dab6943f83d2074fd8c71f8bb26f6ac1a38c2f7726e19e127728d19b890300a330d80a2849
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52035b633f25b395d52e156bd76aa8afd
SHA1c7ee3ef7566a0fd2b22bfa4688b630bcef74afb9
SHA25622efacd0faf0ee475eb0ab98adf9de26797f30d1aa74cab762c9205ef54e6706
SHA512aedb6686a83f1cb5a8077a84828e547736a493e4b28dc7e41977f0b564c8128f566ae290ca2158f6e6c67bdd76bfcdd209c66b530630fba74a76fd8b519aaaac