Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
ea160ecba0f9121b16756574e2608a54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea160ecba0f9121b16756574e2608a54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea160ecba0f9121b16756574e2608a54_JaffaCakes118.html
-
Size
66KB
-
MD5
ea160ecba0f9121b16756574e2608a54
-
SHA1
7e4e008e91d50f5b7fa66536efe91f0655d847c9
-
SHA256
2edc4a7bbb415f13fecc2654903e8dc7acab6e8e83dfad91c8e6e12b2c470cbe
-
SHA512
cc8769dea4882a36f7c21e321a771e3f46532720bd2c98c742f91f081639126f0196bd9005e97ece8804789e9b25d0e9b26699cfdda94000327d2170e45ef96a
-
SSDEEP
1536:Rvkrz78bNfN2ZEmkC5mMAAX4wUQzw3+fBxqaih:RMrz78hVW+C5mMAAX4wUQzw3+pxqaih
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 464 msedge.exe 464 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 396 464 msedge.exe 81 PID 464 wrote to memory of 396 464 msedge.exe 81 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3880 464 msedge.exe 82 PID 464 wrote to memory of 3628 464 msedge.exe 83 PID 464 wrote to memory of 3628 464 msedge.exe 83 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84 PID 464 wrote to memory of 3124 464 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea160ecba0f9121b16756574e2608a54_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0d7746f8,0x7ffa0d774708,0x7ffa0d7747182⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15485941925895954275,1484904885257226432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
192B
MD50a1ebb06373e3b45d6df8d303b320f1b
SHA178cd05333804be89694a3d8b75ff459194f7e309
SHA256397e7144fa0e3b9af59587c362e8578b9dce00973d31ce9d8c6db3a622535df4
SHA5120c925d5b55ea8e43521d22cd238add79fa11c0d77e666a5f8010433c12741db67b8640dfd6ee1cc3131be54a840746d71979316be5d1375199eec08f6963d6fe
-
Filesize
5KB
MD5fade69f7140ad6571fc8bef24bf1ef6c
SHA110ea3dc6f79d41e331bb388aa79a4aeb9d8aa936
SHA256c79df715ba2f4cb6c708ec10570f9504ba692710d58cbccb6738609454519f50
SHA51213472c8017ac2b89a806e862dd61152485689bbec2f1ee0d9eb4e2e048d5a11390a15712b6407b3400e941704eba78fd8a24cbdad5a9d5ba786ea46526ef55b7
-
Filesize
6KB
MD59b6795656458444a5c902a25a174c9ac
SHA1043315e65af1429f287eff8b246347698155ebb8
SHA2561685996beea7b650119718a57ff5d684a22a16dfb1d6718f98389bd7059481e6
SHA512ba486361b17c396af5abf8983ce612f3a7e9e49525648dca0b07646296f464aa6e159f2b0b506112a2ebec9de2a05dc5f8ab8968d38a633b46e08f46bb9f63d0
-
Filesize
6KB
MD5a841e5e32a51575e13f9fa234cd00770
SHA18eddb4f7e632c743da87cd8141b4790d282875a1
SHA256e75047051d0e20c830788c6715b3d2d0be4ebd98ef974314c677ef88191f423d
SHA512fdf635f69be4397a890e2d2adaac8390a4e1a8de0926be8a75011d7238d6c28e7fcc60ecea9e2f943fbe01d5c69456541fa1cfca029c3c6e207fcca4dbc6c54b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57162b93d31d1d2f9e2eec00e61c6cde2
SHA15802ebf951867680d22ceaf4ad9c8427edc2ce7e
SHA2567d28708fe3b6ecd1731f855e05101d6baf6d070bd0ea8fb92705099063739ef4
SHA51263fb188be8a90d21ff607460f3890afeaf5953c599085417d290421fc4ca3acae1fae429dca710e8cf0c31ccba80e4c6563bb5ff33f05299942c8c33f936dd55