Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html
-
Size
19KB
-
MD5
ea83b7164214f57b79a0eb8739650a22
-
SHA1
25b3c64978776de96127b8bf2bab8b0e8e093a34
-
SHA256
cfbd8cda9cbea42be2ce61dcef98822da4e95d193610fa6e245c5a054cfa01c6
-
SHA512
dfecb11877d93dcb34d3271aa11ee7fc0105811d7218dd8582af549386f6baa16f4060b7b97e4b2db3728c2a72d20250806b90c0d8ba15ac3d57877f2f0bc1a1
-
SSDEEP
384:S7aveqDO9ghnXXl0anaPaIlvROrCg0/AWVdxTd:SODDO9gxVdaiW3jB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 996 msedge.exe 996 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe 3036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 3296 996 msedge.exe 82 PID 996 wrote to memory of 3296 996 msedge.exe 82 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2788 996 msedge.exe 83 PID 996 wrote to memory of 2052 996 msedge.exe 84 PID 996 wrote to memory of 2052 996 msedge.exe 84 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85 PID 996 wrote to memory of 4952 996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11372287133399281878,7993171505546394914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5afd88a96fe7e039c2c62125f45991694
SHA10783dda0b299e465124066587cb689eff7afd660
SHA2568a5c2be09991e104c6b733e3e29ab3e191f825d3439e8aaca026117d54ea30e8
SHA512847ef45289317f0b8a00e85cd4d4f42c98634a410a2204cd9341d16ac17167077b2b66939776fdee5663a8440106abdcccc1646ef6490c369917ef5123c73368
-
Filesize
6KB
MD51743e21dac0f1696adf56595e20556cf
SHA188e5ceac5faf7f01eb01c66ece7c40931bd13a51
SHA25678840589ec396972cdf03de97346f072cab94b2257be4e2310fec62cbe05feb3
SHA51200d0c40368e07918cf799d85575207dd931570d6727942116f47e6aef7d90f30f3537b7bfc1174d2b9099caf6061e324f8be12a59d51be7bf6d0b31cddc1f642
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5aa516370785934c8d908afbf7a4452f9
SHA14732fd2f1f1ca04476f60dd3da8225bee751930b
SHA2567eb0d70c6dc61d5b5d022f89ddf9a28eccea15def9e71b5b686e826172b79a39
SHA5127290e752ba0833908846f266cff59f480f856a9c356d1696dd41b8f30cddb01e159d0e4a6932b48e9f2cc47e305bcc8253dbeee66d4be0149ca77cf3d035d524