Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
ea74268278bb81761363adeba00640ae_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea74268278bb81761363adeba00640ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea74268278bb81761363adeba00640ae_JaffaCakes118.html
-
Size
36KB
-
MD5
ea74268278bb81761363adeba00640ae
-
SHA1
ba8ad78600c14c7c73c327f8f36ae0beee160416
-
SHA256
142b59d4970c9802501325ef1641c30541b49afdb6837324e2586617469b6239
-
SHA512
6e9768d106d4532b095fd70b0f7369f1263eadd9e9ff2ae194e7f576795e14eb44a7454d8f9b171e1de799519563dc1d5d6d456ec33f804e5e5cc2426d20ba3f
-
SSDEEP
768:RTevWemVxXBSq7i5DkxmpxefxB4x38vxJ6xmgxmA00KgwO:qr2xXBT7sDkxmpxefxB4x38vxJ6xmgxt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 1196 msedge.exe 1196 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2920 1196 msedge.exe 84 PID 1196 wrote to memory of 2920 1196 msedge.exe 84 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3924 1196 msedge.exe 85 PID 1196 wrote to memory of 3532 1196 msedge.exe 86 PID 1196 wrote to memory of 3532 1196 msedge.exe 86 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87 PID 1196 wrote to memory of 4380 1196 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea74268278bb81761363adeba00640ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5fbc46f8,0x7ffe5fbc4708,0x7ffe5fbc47182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17914429408897661088,2497667411214534920,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
216B
MD58599d9cdeeafa823f35636aba2746558
SHA12f4d912ee434818911e5e246535452707befaa80
SHA256dd55959b1d1d7e4b3661b089ac02a291e0a244496c3a2db9bb2257c4b8b53862
SHA51204327090561294ed234c66e0cd058e312ecb65dc6d6be170c0e5b01cf1927933cd4b7978db44fa3dd7056ffeaba466026ed5211bc0e83738a4702f8ba14abf43
-
Filesize
3KB
MD54df9bf86a31496135a277b2cca232c71
SHA194471da36d5ce2c8d8b27bd0b79b0e4376b1218c
SHA256740a3a92cd57907caf8bf21beda35c72b6ad46e7c0da574e3696a90a6cd6bccc
SHA5120abb703db5603aab3b5885f29c8d60e456f8be50d671aee96764b5db425da9028c8b93134ddce97b1412aa531a93dcd6dccea2e7890968e4e7a0e0d1cd061a71
-
Filesize
6KB
MD5adf1b4cd681f93c137d95686fb262c28
SHA176ad83be59e72cbcdbb01400352956cd81757e5a
SHA256541fb6a196e93ded284a7fbadf81059b232004ef6a78fde43ccb6d7ee8523dbc
SHA512070ec6278e5be1fd7827d5c3d0f5a26b814d02294dadcff8fe012b0a0101ca0bf734821cc21f5c7017811e08df1c98af7f394f64bdb4da44a8238cff655727ef
-
Filesize
7KB
MD5d63a5d8995f445a532dacee559868d5a
SHA1fd87208c64302c9b58a5237a6d7f21053e38d173
SHA256d440c58480beb7587e1507975d2d7247630ce627c51d99579bb7a4b56c2a4abc
SHA51217158f498a30e749f5e19af4c71dab9a5305563f7ae1f7ec395d8944d3ade80171ba7d8dd43f4543a4e27c9b35b4f5c5972135deb0032103026d68e0e5c1d7c7
-
Filesize
874B
MD579642fd7811c8514f07b2a747d7db1b2
SHA1a013089954bc343c717d6ab9c155db7d0eefcb80
SHA256937aa68a369e3d4e5f0c5ec8738ce8814f3f7e1a42e6fcc18c88ebdcbed8cd86
SHA512eaf62bcf8f9db5f052c15fc57fc9f8e2d32f4e45b0f5a5079d3aea5f16d941792f4946ed67a1f1fc509622cd23775d3c6545a7c3969dc6b4b05b591052c9da0d
-
Filesize
874B
MD5d44817ec850e3c062a1c2e91d7788995
SHA1a32396ace16eac3ba123d4f3efc775544d3b5eb4
SHA2565e36becacb9685faa9977068136d7401d77dffb7803886d5300275575d419f46
SHA512e418db8d4a26b273a85e7634004570b8211b34317cccfe0edb68ccfed846e445fb9361e5c48aba3a9b3a0bb6e88cb4c517e948d5841bbb2fde9a5d9c18e7e957
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bbb0723f-bcc3-4165-9ef5-eb6c21143016.tmp
Filesize6KB
MD51c77ffc3b9aec12b49278f68e0e476b1
SHA135cbf626a4506a4e6dfb8f16f296eab7c5c1299a
SHA256ecdb2663b4bcd6b4b35985b02e2c6ee6b3d6606f16eaa18c41f143dedd8fd86c
SHA5129b1c0bb18a30d2d4437a0afcc051e5b10281a56d0c4fd0584a6f19737983dcd46a03a4167afa17e5420090d2e8067100b5339f9ad8bb3eeef0b3c49f76c70f63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5988681feca91179658e3e3d429bef5b0
SHA1265451ade4aa16382cb748ff4624f54286ecb914
SHA256382ceae44419989b4ec1ba98aa70e8ecf18bcac0de9814294f5eb0770f5f8313
SHA512378024566c2a1da94afc4a2c1166af008385a1602d81cd8ba925ae637a87638eb1d74fc61ff486b6edcb9075edb0830557544ca2ea56628e9701c97766fe38c7