Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
ea3785ed0a3e4c5c23b1fa42d27328a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea3785ed0a3e4c5c23b1fa42d27328a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea3785ed0a3e4c5c23b1fa42d27328a3_JaffaCakes118.html
-
Size
139KB
-
MD5
ea3785ed0a3e4c5c23b1fa42d27328a3
-
SHA1
e3473a50fdbce8abe847cc48014523a88301430e
-
SHA256
2964c6aa3047682978b49c51d85fa26a8193d69988e4fdf127120c204b5c01b3
-
SHA512
855162312f082109d1140da5503065c8c33df81a36014950439be436224ec713303a94c25254823d0607238553e8be22a5f01025c0b32452e5f2ad28d533f5f5
-
SSDEEP
1536:S0Kvb3NZOgGGLw+qltyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:S0KeyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 2012 msedge.exe 2012 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4572 2012 msedge.exe 82 PID 2012 wrote to memory of 4572 2012 msedge.exe 82 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 2956 2012 msedge.exe 83 PID 2012 wrote to memory of 4816 2012 msedge.exe 84 PID 2012 wrote to memory of 4816 2012 msedge.exe 84 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85 PID 2012 wrote to memory of 4496 2012 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea3785ed0a3e4c5c23b1fa42d27328a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9931e46f8,0x7ff9931e4708,0x7ff9931e47182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,656828975831374447,14638254547094639804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,656828975831374447,14638254547094639804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,656828975831374447,14638254547094639804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,656828975831374447,14638254547094639804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,656828975831374447,14638254547094639804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,656828975831374447,14638254547094639804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
476B
MD5ba47a79b50a96d7f61a51487af52f616
SHA15c0cc82f9f0ad6eaa5b0b0bbaf3979b60b5dec25
SHA2562bd2bcf8b4965f01355cc781fb45a592eb61723fe056b6e926c1490e45b164a5
SHA512ede587bb03bb154edbb8ecc650290ffc3b14d8bbf43f2472b2ecf6490f10333cb6a4122434e64b510d30c9241d1d70cfc52316fa53e5d5a77fcb2282464d6b6d
-
Filesize
5KB
MD541b330cf63b3cd10edd0dc1dc433059a
SHA121edcd915af2d66eb343ad4e6686cb7df8161140
SHA25656985a224a4af53d93f96855a8c2b1bc61fe18b54d8331c6511d579a1c02f33c
SHA51241801e9af4434dd2400ad15790c1ea7d64721a8e1e0f4391112be85d00281aaf377d886a285f2dd0e4741219bbbcde2facd77e2a04684967080f0a2172c8b7c1
-
Filesize
6KB
MD5ae24363884756d9d29cab82dbb016768
SHA108d734fbe804a3bcf1713649bf9b27a43a1c1476
SHA2562a33d8897998db03cd68f985c3d1662958b2c40a1dad4e27ad8ece30e260145c
SHA512799c9350e36192d4c59b4cb2f878c1f2c04048603972699ce33a80e7349ffc33b8f216bf036fc068fff3ada014980e89e9ac38ba7d80332551c8c39b6e798783
-
Filesize
10KB
MD5b06253bac774a2561099e1bd6d8e4b3a
SHA1c58bbfedcc0461b0d69cdebba8a549512ba7d67d
SHA256dcb2595e685f276b34844f012256b7aa58546a37f1eae7f9bd40fe272aee29ef
SHA5125d53c4d91240fa339c0b2cca1510dd8f3bdb24147e519cea6f7b18e3a3a021b4ad6db94c73572c181e54b4c965362d656b83a1950738280a8e2ae0704d429393