Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
2eb0ee1c4d5fb6c5577cdd3e65a60149_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2eb0ee1c4d5fb6c5577cdd3e65a60149_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2eb0ee1c4d5fb6c5577cdd3e65a60149_JaffaCakes118.html
-
Size
80KB
-
MD5
2eb0ee1c4d5fb6c5577cdd3e65a60149
-
SHA1
ffd168967ffa6d3f4fbf710d772a4c6abb4ac5d3
-
SHA256
894c8f29b53b14263a286362b21c5a519eef44fab4b6126873954c23bc998a5f
-
SHA512
0e102ebe46034dfe9293d35c89dc797512cd58fa82f593962865d3db8d5b57a15bf971241b8507b3959bd55e055f9dc31d8920485cf8367e5282fa132504eb34
-
SSDEEP
384:SILHIVhZloqzfI+wBA0cRWY+S3lKQyOy8BV3tPxtaeX72P0AcxF10EUUWM7absAt:S0kbw+WqeUWT57AUJuP6mHagw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1404 msedge.exe 1404 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 5380 1404 msedge.exe 82 PID 1404 wrote to memory of 5380 1404 msedge.exe 82 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 5040 1404 msedge.exe 83 PID 1404 wrote to memory of 1348 1404 msedge.exe 84 PID 1404 wrote to memory of 1348 1404 msedge.exe 84 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85 PID 1404 wrote to memory of 3916 1404 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2eb0ee1c4d5fb6c5577cdd3e65a60149_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a06c46f8,0x7ff9a06c4708,0x7ff9a06c47182⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8501760438401758884,2475066622782110929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD50ea2cdd9418ce45bb631df3c2e0ed288
SHA13b72d3309c5fd5d86bee3d55b8e321e498aad433
SHA256aeaaf6fb4c794118d27b1369ec0ce2f6d9379c88ca0097a5707ea75f5c4d8e53
SHA512e4e78f3e2c075305aa336eaff2c959a130ee510ee657115f05bad1c0ea117a4c77877e2ca1675c027428eac65143f9108e40bbaab7c9409e95812429e9273f25
-
Filesize
6KB
MD515c7dbbee647cb6260e8248acab9a282
SHA1d1c60feb77c65e8fadce98c7c46cd7ce2ef5010b
SHA256d782b344a65afaa4984f4a4c1e67b2c7f859eb2bcd820ddecfff6f1057d6ecaa
SHA51265e5dc9ebb26126cc75992d2583820334c05a9e5219798cbc008d2b7c08f7f091c99a32a2775af7feba5cb3e36e5695de2e07c6330c11fa462aa80f89f908e74
-
Filesize
11KB
MD539f017ee80b5cfe1d023e40d382fb35c
SHA15ea7864523d065cb14952b3b1f041f40226f503e
SHA25656de14c172344e026f8b5c173c765b39bdde3887dadbcd9689e814389bc5f2a7
SHA512246eaad73c45d3b73da3e9005ea33548ff2b7c3cc701dd8e3f6d2e5b132f1e2fcecdbeca5a0868062deb4b5dd7dc916d63e1253bbf41b32a3a57123819f7c10c