Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
0eaac67f117c4f979b9f1c19d961c5cc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0eaac67f117c4f979b9f1c19d961c5cc_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0eaac67f117c4f979b9f1c19d961c5cc_JaffaCakes118.html
-
Size
100KB
-
MD5
0eaac67f117c4f979b9f1c19d961c5cc
-
SHA1
8373111e3c6eb4f045870477a9c134172bebb2ba
-
SHA256
14337dcc67512ff0c36635070c8f276d31213cafa9afcf405209bb5330623594
-
SHA512
4b37e4e8b2daeb883c5a9ddab9cf058320052f8413af3399c8ccc4c53cf4acb1343f86379b04da5e60ad97d843c06c202dccc1deca3d537e61b2dcdea408d554
-
SSDEEP
1536:SGS2w+zsWIiyyntaQdMbm92poMh1rmYC0zZ2wQzRVkFZWJRigGEFhH2csw:SGSR6YCHTzRMIigGQH2cF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 2588 msedge.exe 2588 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2688 2588 msedge.exe 83 PID 2588 wrote to memory of 2688 2588 msedge.exe 83 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 4912 2588 msedge.exe 84 PID 2588 wrote to memory of 1008 2588 msedge.exe 85 PID 2588 wrote to memory of 1008 2588 msedge.exe 85 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86 PID 2588 wrote to memory of 816 2588 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0eaac67f117c4f979b9f1c19d961c5cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeba8b46f8,0x7ffeba8b4708,0x7ffeba8b47182⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2416854761982252529,15703079298860313223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
5KB
MD51692d29ac97cf0f5c08d6bcc86f9db49
SHA1c5d87111e24a3b6e38bf21f69b51d24c428db5e3
SHA256451c0a86cb1810f9492762aabef02aef08f22e5f70d5cb9e093529dbfadd14db
SHA512fd2e9fecbfaa66cc8941163b43bb5e2757f2f5b81f6d32b68b328039c7c8279615fbcdbe6ee1ac82a0ec34cbd7c1ab0fd17ac17e165a0c764e2bedf706b9dc67
-
Filesize
6KB
MD50850b95ed85814c107288616f8daf453
SHA1891dd4fe7318cf0db3a5effb19d1c4597e076c7c
SHA2568b34b30540b65b5ed3936f5fd477bd8e86953ada56c30e0f330b01f94c6b384d
SHA5128d1b51de27841289031d3a7ff0659403d8d6255ecfdf8a19209c86967496d6a5af2347062ab029781d63ee0652f11a4308a6ca2291bb992405867d39c6e3b889
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD550f5f13c62d8aa73ba4369e5a549ebd3
SHA1615a850ea9bda2593a815180b3053cd08a8f6655
SHA2566e5c83b7d10dc5bf942526afab314e51cc39ca268a9a686d90ecf992d1a648b2
SHA5121ba9ff3af17c36f90dfffec7337c36aa123665d1e5ab0bb779884746de995cb6483a0a60362941cffe67783b244ca83ead139501c5e8b0841c127ad39d9aabab