Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
ea8518b39e50431b811bfc1dbaff9dcf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8518b39e50431b811bfc1dbaff9dcf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8518b39e50431b811bfc1dbaff9dcf_JaffaCakes118.html
-
Size
9KB
-
MD5
ea8518b39e50431b811bfc1dbaff9dcf
-
SHA1
fb0197d977fadc1feed4125f2af3106cd03a15d6
-
SHA256
d364f0ef2645bbc8c33cf9491b6a4139285e01ca9ad4b5f2e3f6e06489945bce
-
SHA512
bbaa71729bade60fd02e5e4805bf5709905eea7ef794641441d8bbed21de044d00b97db44eac3bed5f79e55dd5a18a743fade1892b11db22526d512440e5b484
-
SSDEEP
96:uzVs+ux7X4LLY1k9o84d12ef7CSTUdGT/kDI1xpg0lVHcEZ7ru7f:csz7X4AYS/4Ag0PHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3460 msedge.exe 3460 msedge.exe 980 identity_helper.exe 980 identity_helper.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4072 3460 msedge.exe 82 PID 3460 wrote to memory of 4072 3460 msedge.exe 82 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 2840 3460 msedge.exe 83 PID 3460 wrote to memory of 3092 3460 msedge.exe 84 PID 3460 wrote to memory of 3092 3460 msedge.exe 84 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85 PID 3460 wrote to memory of 4916 3460 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea8518b39e50431b811bfc1dbaff9dcf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93cf746f8,0x7ff93cf74708,0x7ff93cf747182⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7584493845515449993,11666983099140071877,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD57fa9de1620b9435d78d74ac63f5f1d7d
SHA1e233da5bae94004825a78fcb952e1cf364c7e137
SHA2567efdec8e1c05ac6b83c78dfe52355c137d8998ca8ae4a29d5dca94b4a097b9ec
SHA5124255364f03ac9ac3605cec1cdaeb508726c6e5cf2fe4158090bb16b634056bada1dcb9513771e9e6e6671bf950e43b0a127ee15b9e879f40c8846fcd67efbfb7
-
Filesize
6KB
MD5bfaece3306f2126478d64e8f6add0d21
SHA1b5b5bdfa699db6abb6336ad877bd11155a5fbd6d
SHA2565562e453d2b5a480292357983c44ddf8332971d7b75a8938b76672831dfdea3d
SHA512eff045d7800c63579c8c4911d8b9702946c6876ed283f6113c89d7c579b0294ff20ce070c149a818ce8241bfa6d36c2947d119068ec47d2572e5f21ba1724cb0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD524228629d93e9ab82089756dad65fcdb
SHA18a5aec9a82e93891a46ebebff1e3ea22f71df240
SHA256a703c0f5f75b26732b35a231c5b58293e32dd4e1c47f9605c23f0ca64cc888b1
SHA512d39d8b88fe7acf2a7e13f57840a084d086e9259fd72109cd60238685cb5592f528fa1fd0a201ae8e33fa1a162e3ab95ff1c0a527c8aa0dc6d7a4312f90032c7b