Analysis
-
max time kernel
156s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
eb5f80518067a4b232cab2378ba4831f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb5f80518067a4b232cab2378ba4831f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
eb5f80518067a4b232cab2378ba4831f_JaffaCakes118.html
-
Size
3.5MB
-
MD5
eb5f80518067a4b232cab2378ba4831f
-
SHA1
208d8a271666d5337ba3b8fab66e02692303547a
-
SHA256
80e7a3245ad7452826b3f9a6875daf2877fe3f7b271f3706a5d8181646b6f29c
-
SHA512
83c6ce72b8e24522666fdfcde613a77c4b4060f1bcb28682a9510148a606a7a99814dfcaa0bda98897ccf0416e6a83e14b36d255e5fef55ee47686af753d46ba
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NSK:jvpjte4tT64K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 4004 msedge.exe 4004 msedge.exe 1832 identity_helper.exe 1832 identity_helper.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4856 4004 msedge.exe 85 PID 4004 wrote to memory of 4856 4004 msedge.exe 85 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 4704 4004 msedge.exe 86 PID 4004 wrote to memory of 2116 4004 msedge.exe 87 PID 4004 wrote to memory of 2116 4004 msedge.exe 87 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88 PID 4004 wrote to memory of 3396 4004 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb5f80518067a4b232cab2378ba4831f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8f1b46f8,0x7ffd8f1b4708,0x7ffd8f1b47182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16961954641765453005,7688014517523474438,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
981B
MD5e31222748cdaac8d12d22a8ddb0bd6a8
SHA1d120dec30b963e9ff0a89be5933c63bd0148c269
SHA256be02eafd524d86319dd15a19912373459cfa80a0276006e13a0eb3f78b0cf217
SHA5129c59302214c31aec8654f312535690db4ee7cc52d9c364238f71a064fff324e8e0aa872f0d49f8de480525b84c785f878381815a552d1c81d51987c87006c704
-
Filesize
6KB
MD51ecc105869f06236fb07c18c561a6aa1
SHA13c8c84bc50329177300febb98c1f60e8b43add56
SHA2564198d2b41c7fe713f5a73a33447554a38cbc8186b4df6d92a09604c65c6d0ee3
SHA512850732748999fb465c802d6d5d08f7c9b2738656c808a3713f96b31de088f21957607c8fcd53067982b7f74bb325e58fdcd68ffe803e3c3885416867b1253725
-
Filesize
6KB
MD561951548714580db8b2acd32ab5f7c3a
SHA1f340e7f29847bd5b5d401008ba0c38ff98640224
SHA2560443997b16d79002f9eb7946e459ba17881e3d4d2ed0808cb2f50078da714cae
SHA512af2ee50ef3d13f049920b01a5a5950edb320fae8842cb6a754bde2e6bbcfe793b59b3605c40f82b0b56aa5d6f337a74e8121e304a03be537cb00f7d048650b47
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD500b8254a5f4710206ac72890fa860652
SHA1aaad532bdc9587c48a31f5c03c3f7b4817640e05
SHA2569eb5e6958ded8cfb1f099d3e9dc2f90bc0b1ec7a6d791f6b37e8cb7ca350650e
SHA51255234c9d6c2313adb2b4ac3d08591b51226e6ea937a3c756d321c16c6aec0edb68aeeeecefcc0f922dc6a0c0f15de635ad3e20eaa6254887a08e50d73d330f69