Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
eae0ddd9890bd56e5ae9f2fd450a6e3e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eae0ddd9890bd56e5ae9f2fd450a6e3e_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
eae0ddd9890bd56e5ae9f2fd450a6e3e_JaffaCakes118.html
-
Size
188KB
-
MD5
eae0ddd9890bd56e5ae9f2fd450a6e3e
-
SHA1
fd6afa70090066b2a088a2aaabc4c757048d4cd6
-
SHA256
f094b6ef7e356e52f83b508d4f5f428c96d3326b6b14b69c508feb3fdb5043f2
-
SHA512
3096211b2ecc7028c443d49e4b29405dc73002bf53b82da7808731054fcbfa3f3daa5902f2bfa03d753d371721efc775a15d4f6b057bea7eb4530b5873770def
-
SSDEEP
3072:mHWrfF1VqxfhfmLotc1LLddcVVI2q6kFn:mHWLkdhRtc1LRd7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 4520 msedge.exe 4520 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 700 4520 msedge.exe 87 PID 4520 wrote to memory of 700 4520 msedge.exe 87 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2704 4520 msedge.exe 88 PID 4520 wrote to memory of 2792 4520 msedge.exe 89 PID 4520 wrote to memory of 2792 4520 msedge.exe 89 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90 PID 4520 wrote to memory of 3736 4520 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eae0ddd9890bd56e5ae9f2fd450a6e3e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbb0846f8,0x7fffbb084708,0x7fffbb0847182⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 /prefetch:22⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5174166067997224424,12828566927874831999,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ce98af77ce8a90ab433315f8793ea5bb
SHA1a797b8520c775b210d63fccde294e33af259709c
SHA256593069566eac1536c499b73f41c8825fd791edb0eaacfe056c819c0c2ba862de
SHA512602b8a8593c92b45e40cf32fe65e5b41d476d61bf6d55172d951d9ad677319c5cfef5857d5e412ccd03688a6771a001ada06ac56cd3f2e04c17dbae35262f79f
-
Filesize
1KB
MD5addd9adb126482422587974cb45ccd6f
SHA11d8bad50ae08b6beb9ed8818ce55504e37045adb
SHA2561e0bc9db3018f21882e2dea6da1b902f4de51f82d0aa9509a41e2f6234f38e82
SHA5125785909c02565d18b6cdee152bef7c3c9b3d2ed8eefd6464d5fde17fa9fc42a6f453e1b8abdf20a17bbcff53c6c0c5dec0c8abb90f1ea6700dbbe4c5ae3a2774
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD51155c87d7a9075bf0f9dd58fd301a2ae
SHA1c8dab63f3aba67e3deb58de63061a25246a8900c
SHA2563c5fc17216189028df5fc92b88764330e9313f5e06eaa94ce487c4689d24cdd8
SHA512cc7d27f3d158d12d0aa29d17175ce2aa7272590b30644d75aa5679a81d187d5bb7034b3b00184e999f95b5006d173c8488e64475e9cfb3597caeb4a1590b2db1
-
Filesize
5KB
MD5620fdc02108621b7e58942c5d48dc3a1
SHA164d814e228b162edc85885fb59578dfe01b3a1cc
SHA256f8e54615a7b768446c66e44a68fd0147ca85392b80e023edb2503d435b3dfda6
SHA51261228d32e03fc169935bd2c8d3f57cc34a216654f02cbd6e98975da1cf31e79a8808f9e27992846ff321bb1a2565d9df4e40fa9ee03f276d9034c7c652583e65
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
10KB
MD5c25c6c0b84c856ade9c645136e8b9b42
SHA1e5c9e100e14beae8745c2e53228a1a1d51da0211
SHA2567c24f59414fbe8632f15d5fb416cdfaf160f7874eda336a8f6590dbba1737b95
SHA5129487be2dffc0916c0abf3c63980c0c57ffe8925f4f575137734b0edc11f394054b3b11b419a9981ebf6d0b811868da65ec1a069659f3b30fd88733ed4a268441