Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
e8f256c2294fb491a6dccc7238aeeba0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e8f256c2294fb491a6dccc7238aeeba0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e8f256c2294fb491a6dccc7238aeeba0_JaffaCakes118.html
-
Size
155KB
-
MD5
e8f256c2294fb491a6dccc7238aeeba0
-
SHA1
6e78c23ff769d236a095a45af2c86fc39c9cd744
-
SHA256
36b1dccb8b8d3b0008f4061356cbc0fea274972a0f5f81f42ce21315b36c7b9d
-
SHA512
403748085d104d169c6c434053c4b6f40d091eb0e23f52e46caa4854d502da1fd7a5bef9efa3bbf160ca186b12f380d9eeb257c43dd828a702fa01a5fd42b46e
-
SSDEEP
1536:iiRT+YFcrZBnbT/yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iw/Qnn/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 3972 msedge.exe 3972 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 1452 identity_helper.exe 1452 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3608 3972 msedge.exe 84 PID 3972 wrote to memory of 3608 3972 msedge.exe 84 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 3016 3972 msedge.exe 85 PID 3972 wrote to memory of 1904 3972 msedge.exe 86 PID 3972 wrote to memory of 1904 3972 msedge.exe 86 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87 PID 3972 wrote to memory of 3888 3972 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e8f256c2294fb491a6dccc7238aeeba0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa461946f8,0x7ffa46194708,0x7ffa461947182⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12895396264521634906,16816389040804664858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD58b0881be40ded1f37d076bf0214e4318
SHA136916cd6174008b4c834dfb8fcff1ca45f778725
SHA25624c240cfea5fd33ae990fce2108cde4dfc95893581e3d4d486812123909907d4
SHA51249e91a9a577e9b9d982299f4cd73dcdfa23233f45f27b4c6c194607ad08d0e5dcb57603fcdcf60f166cbcdb1f683e381026f684ef15b8f1060ad718f3484a02f
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD569f97501d1c8a7a6c58280cb4875d574
SHA18dfe2987835b374cedf7dca9603794033e4e4a43
SHA256c039a97c19c402cb23b70b379c4babcb4a50db89f072301a10389940c8f992db
SHA512b0bf0abd6ac638435ed60818c836fc696dd14b90eaec1a788cf2c28ef6093c420d2f48240214b8aa9a290aeca583462783e9c0a6ac892edc769fde873fefa5f4
-
Filesize
6KB
MD53cc68de4074f0a47eb1e4850af4ad2c8
SHA13d085852e690a6db7f0c01b8bbadd26fd85d5386
SHA25666159b1181a7e885352b859ff2bfce1f85f690b902cc57b07db21a5f4ccb8652
SHA512dbb2b56862dcf807fd126e94eeeafc04fc314c82cbb6d8a71f3584452977fea35e5e8272ae4ec22cd8ad4ca440ab92581da89d684a6383cc7d343aaf97ca964b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389