Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
ea8463cbeac9ee0c64c4bfc68554e179_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea8463cbeac9ee0c64c4bfc68554e179_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8463cbeac9ee0c64c4bfc68554e179_JaffaCakes118.html
-
Size
36KB
-
MD5
ea8463cbeac9ee0c64c4bfc68554e179
-
SHA1
a8e52c5473cd791426ce4131b98fe1b52304460a
-
SHA256
baa8d5762ab1b3fce6e69fd5a41292aed93669c47d751d72727eec92cbc262f3
-
SHA512
c95e7973e0826b0f5e894df62ea2ba9f665094286a0aadbcfa2c8f2b8fb82c9c836326b185387b9b36821deeab8e9ba3f7228e552a3073058c432d51f06e750b
-
SSDEEP
768:zwx/MDTHrj88hARDZPXOE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRq:Q/vbJxNVNufSM/P8jK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3036 msedge.exe 3036 msedge.exe 1480 msedge.exe 1480 msedge.exe 2992 identity_helper.exe 2992 identity_helper.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 4468 1480 msedge.exe 82 PID 1480 wrote to memory of 4468 1480 msedge.exe 82 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3560 1480 msedge.exe 83 PID 1480 wrote to memory of 3036 1480 msedge.exe 84 PID 1480 wrote to memory of 3036 1480 msedge.exe 84 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85 PID 1480 wrote to memory of 4776 1480 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea8463cbeac9ee0c64c4bfc68554e179_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd21b46f8,0x7ffbd21b4708,0x7ffbd21b47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1706722777095543528,10713209702301371314,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
614B
MD5c13797958cc8c67869fbd274f17b4005
SHA195416a5273b803b879826f3ca6836961f7402239
SHA256e2fc73cc1953f0366cd70c1083add30580c33834856ed7fa6a63b0728c6acacc
SHA51244bb65b12744b0ab6a5e54ed6804d7d2f37d0de3b2cb12bc5c69e2335d1585aa5f27b5536026cc03901a878e7c252d73b2e65a6782aa8870648389c004f21d77
-
Filesize
5KB
MD52dfacd51ee0df264d971bf33593aa396
SHA17ac4a3a1bb3ff5add30a106bfe7bae5c7a91f926
SHA256cd49af92922ba16788a989fc7d4574014d3e8e50f70a9815e0306de884494a85
SHA512a99dcafa5bd7b747d859a80f6b63ea77c01ec7722dee5e36b193b5a1a8c65c049ef5a397f8749834a3f58e69fc6ac72e41dc9350b024748a77236efa2114f2e7
-
Filesize
6KB
MD5908e0f5dfd87bb2b1d13e16340884a50
SHA157f3e19727aba0be1eeffd0841bc438fe342776d
SHA256cfbc4639b166da12b1d5cda788827f21d3633799467d426f480f5cf6085d013a
SHA512e9cf2f1c54ced5f7d3fb9252fa0d247a70d7873a74b429827fe84ac33f3d76f8a455e1350306553c7cdc1dd98272d72c50605ca08a99c4e006903783e788c55d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD556e9f0356cb8b29dd5484035ee0f71e3
SHA19169d01c4280526463c968aa1e40a1c493428984
SHA256b94240d5e4ae63f916da7ab38b0e75e78ca2b89de748a22c65a219c00bd66b87
SHA5121fc3efa55097e9eaef76bd864bcdd8febe47c04d7344c91f165edc3d0b02a0ccca0d3e3b9597da8ec91756e00878b2037c4c89afa76fd33de60cddf74f7b277b