Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
eb21766d24e7d618ccbd29d1cd9190a0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb21766d24e7d618ccbd29d1cd9190a0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
eb21766d24e7d618ccbd29d1cd9190a0_JaffaCakes118.html
-
Size
47KB
-
MD5
eb21766d24e7d618ccbd29d1cd9190a0
-
SHA1
e1a10fd47d209edea80d1c31cc035062eceec4a4
-
SHA256
3a4dcd2dbfe3b1fcb1eb0c0386831a20ca8d43d89283fe4f0b9d3ba891492f84
-
SHA512
bb950e765e73208b905b0f61f5ba2a021a71bc01c3bb63d65e8342e251e09aacbd9f2400d9b98faa1246243f66b780faa543494a43f875712caedff6a252162c
-
SSDEEP
768:k1g4PPWtICvwGwl6ZreWreBLddOPVJ5/Gnt8xhn7u/BfjVdWVYcKR0cVyypzBzw6:k1g4PPWtI7Gw8ZreWre9OhnefjVdWVYz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 1668 msedge.exe 1668 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2464 2636 msedge.exe 85 PID 2636 wrote to memory of 2464 2636 msedge.exe 85 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 4104 2636 msedge.exe 86 PID 2636 wrote to memory of 1668 2636 msedge.exe 87 PID 2636 wrote to memory of 1668 2636 msedge.exe 87 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88 PID 2636 wrote to memory of 4872 2636 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb21766d24e7d618ccbd29d1cd9190a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd331946f8,0x7ffd33194708,0x7ffd331947182⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1200536420127705319,3367135101763984105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
583B
MD579da9bee0d90d5f50787be3923fa8ae8
SHA16daa5e02e6cc39c3603154dd0655bbbb43ad7511
SHA256ad87fe466a67135501faa683f3b030723cda20838318d32563c2ef275b6feca4
SHA512456f85eafc0d9b14c1ee98a5bdef58f28942055d3164787a47ee523b03edfe9850870b9a54336bb856032651bd9e3ee600dcb35c751d603afed7e65f444e517c
-
Filesize
6KB
MD5150d0b943bcb4eb70d68f07f163be83d
SHA14f0dbd9976158ba3b30d7083fc4481516cc42557
SHA256a4da75138a7124dd3c42f16dda9a2ae00902c0df3a8e0d1b3a5b546570024d60
SHA512e39544ead374ebc38b828bd3349ed95ebd7bc08a1be093aa73c71c737567431664457921041c093c455ffff6143759b0aac796cc721d149e6532075dc95dab11
-
Filesize
6KB
MD5686e00baf1c5f9897f81b962a06cd279
SHA11dc62b207824276513fb7029dbc7a5327fb3bd17
SHA256e44e02ae7a9d71fa860a8ef0b4f9f373c075bd84cd7af2f80ebf4bd409f97ad0
SHA51242c3315aee6f5da30987a6b011d8f03349f9f6aca4398a5207bffec582b04ce2532bee0aedd27d98f96d6ee2825aa140a9b0d87b44d24427d83e1b83ee788994
-
Filesize
6KB
MD5179759a3f090619a39cdffd0c5ead560
SHA1b459f77d20b327e20e290d2d1ac07b725c8f868f
SHA2565c10297e0e2beafe7a1ff4d69ea52aa3bcba9b14dc76a5a507f60c6be0dddcc3
SHA5123efb2d5e5c790189a9b4eb11594d59e7fd1bcf821582f5502eeb5d4ec958422113d2ce9a8b47c70dd515a25423a23b41c1dbd56e82be192b5983bd80218bde80
-
Filesize
6KB
MD5ac5c011d04b7e3f332142e1405ddc6d4
SHA1bdbe1d08d26e7083cfaa6294885568f6ad93ab39
SHA2561fb94b65e018b4fb8f548623186c7a2fe4aca61536f75b16ab6cc56abeab11ed
SHA512b5834c0c22058f30ab0d4991b8facb6769855494ae533cd5819cf5b7fd5ca33e0c6b0723ca154aad3e98de52cc25a876dc64976732c7c39cd422a47b41f573cc
-
Filesize
371B
MD5472d27f84852c8aa5d6955e7f17ff6f2
SHA12bc960913dc0a6f2bee0350e0db130d41ce5c3b2
SHA2564ada94714dabd6fb57246a56c11f4c1227231076e3f3dab20711307b4638b492
SHA512ba9c5197ff07c9346838059e17b541b8563d595dea5bdfdc6c313701b3140f1735e303d7f2996368f65808c2857f76bf475004a153a6a33d507999e879da6c0e
-
Filesize
371B
MD56c8a24a8b00d32a6aae4597738c28616
SHA14a70caae1ac32e0841e97f5d91fb5b49aaa40cfe
SHA2560a990d2345fefce5d5f28bf986dc799c8d13cbd172d43fef0eb4f229cc457eae
SHA5125732e48c69ab67ff7de8a719e7fa932f16e57245138d17fd7327f0ccf660e4b48cdb4d50f21e2e70870c42d35ee1bbd591ebc1ada4bec6d33e0e1800b6fe1099
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e4d8fbf4e95ac1855728f0fae4010718
SHA1c9039f5c50b0db802c8f61d4f63937e0d0d60478
SHA256716200f4f1b160b66d8684a8c1420e632ccc61a5dbb7ad7407c5108000280f64
SHA51246b179fbec5387a96a43e6363d0cd332acc83ac5d692d492d12beb46728148e06987957a538e1427f0030442816f9be7080c59f97d50c531ce2ccb2030468435
-
Filesize
11KB
MD551d9467c8bcb262767e6cb037e7a0076
SHA1b8bb1fa684a672b09933ec44ef34d8b21aa50ab8
SHA256fd97c7db4679366bf659f0dbccddbcb2d3cd460c7bfbd59aebd41e2b2edc926d
SHA5122323fe11d3b3d2411614683f14bff5067b8837078e2cc2a73ea0eb2b81357a3ec7ea4333a6a2961d7f34835ab953ba053fa1fc5793a43bebc6025a98f3c19509