Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
eb7d1cd0b8b1ad06c23453bd2e7a8b43_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
eb7d1cd0b8b1ad06c23453bd2e7a8b43_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
eb7d1cd0b8b1ad06c23453bd2e7a8b43_JaffaCakes118.html
-
Size
3.5MB
-
MD5
eb7d1cd0b8b1ad06c23453bd2e7a8b43
-
SHA1
ae2c79a26cde0a43efbc013b58486099d734ed88
-
SHA256
210e39aa90019e4bc309149e19bfe9d902b132b4abaa42b9a9fc0f5121b4fffd
-
SHA512
e53cb5606e442bc8cc0682c5cec95d0f1cf9045a6115ab5333d77998e03fe2a57406df2b0b3e295c676417cac6de9c5566431f5d54a06b412fd0e9e2ba9913f1
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NNW:jvpjte4tT6DW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 4720 msedge.exe 4720 msedge.exe 1860 identity_helper.exe 1860 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3092 4720 msedge.exe 83 PID 4720 wrote to memory of 3092 4720 msedge.exe 83 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 4048 4720 msedge.exe 84 PID 4720 wrote to memory of 2336 4720 msedge.exe 85 PID 4720 wrote to memory of 2336 4720 msedge.exe 85 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86 PID 4720 wrote to memory of 2280 4720 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb7d1cd0b8b1ad06c23453bd2e7a8b43_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffd8b46f8,0x7ffffd8b4708,0x7ffffd8b47182⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2084 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,12159087808911327405,5989958811997345412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
981B
MD566950c3cc7dd106c1498602924c5c0b2
SHA11f9bbd156a0676942026f579f2559427e258f7cf
SHA256f091e533cbfca6f91d736fe317b327e3dff7c2f39244715523ea78dd6cc50018
SHA512345093774574790d5168e99e18952f3e588a0448b414cf336e980afe34567a498ac7d3f200268e9ad13486f5d79b76dcf32aad36a67591acef0db0720e9d9b24
-
Filesize
6KB
MD5f2a73dcfec1011de0cef0056e1527161
SHA1f9d0d10f5b6f1bbb094f77374a442d39d0d497e5
SHA25627464cf8d8d52f21630f17e113e8d3c0f2f3b1c581a1dd40aac1fd32bcbf377c
SHA5122d9ab329ba21025871f63fecb5eb47178aa3b2cf44f850de956cd8a35be84d881ba9199fdf35660d835c876c2bb6de2bddaa683ef6aa03bf2f7f89c545bd9835
-
Filesize
6KB
MD5fcf5593d6c0f739d8e9791b2204715ba
SHA14bb27ffd3300f663c3961d6f30ebabec2a85fba0
SHA2566ee3b397a95a5e666b294e2e0f5e08d237e7cd6c19a0ec3652a46c685ed3c5b7
SHA51231ffecb03f2a4b348cb8dd955ae20b4e8559541cc786d08d5971b3a4dcf9544fc70700cc818b460319e912447f6baad78d16efe79d3a09ebdbf6002ef968ddaa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cfbcc49d64b564b58f52ac98c8f24e9f
SHA10e6d07487d97e0dbb66dc3e770dc70a77fa15248
SHA256a49eff17c6ebe4461e8627b58abba357d9b72d047bf554b9e2a1c04e06121e77
SHA51237d71af60684eddeced872954c9ca7aa588400fc1506e43af956a0b4596182c0f8220c3e739b6f56bb5df50240489877e4cc8e8e95ddda68366cf78f3d7710de