Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ea74ab0f4fb43308af98def0b0363795_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea74ab0f4fb43308af98def0b0363795_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea74ab0f4fb43308af98def0b0363795_JaffaCakes118.html
-
Size
93KB
-
MD5
ea74ab0f4fb43308af98def0b0363795
-
SHA1
8e7fb7eb5d8daab477ac76c252e5f4b896af4e26
-
SHA256
e09ed192e4abfdad77d2763f4b5ec52f1c7b57ae7acb7abe24f58296310b0b33
-
SHA512
c41c93f4e2d24b508861e9d18a8c9be253b0c09eeb3d7319668d64519d5ce4056754fb7c071fdb5fa858846ffe6dd10c853cc3c4c215090a9808f1979e76a835
-
SSDEEP
1536:w3umsZhgETXlTgMrPX6G2O4TMY90m7HxBVan7PsAfry3j8ihb699ztAowb7pBtD2:WumIgqVyG4RFvd9owvpBtD/yDkQMMnui
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 216 msedge.exe 216 msedge.exe 5008 identity_helper.exe 5008 identity_helper.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 4028 216 msedge.exe 82 PID 216 wrote to memory of 4028 216 msedge.exe 82 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1628 216 msedge.exe 83 PID 216 wrote to memory of 1508 216 msedge.exe 84 PID 216 wrote to memory of 1508 216 msedge.exe 84 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85 PID 216 wrote to memory of 2996 216 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea74ab0f4fb43308af98def0b0363795_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff379446f8,0x7fff37944708,0x7fff379447182⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2544146602017362186,14756875970964565527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5c854978cb9b0b448979c357fe17253f9
SHA1f7804a4783e71ab3f5119d109e648ad28c3034ba
SHA2560535ace0203261b4a905df83cd373e6f3cb38da7f24ac6dbca4323208fd2d02b
SHA5127bed2576ca6e4cae19fbc916ad8e5b31084da5b4c3fbe3a9d9f0219bc533c0832947afbe038b7e93eca45a94e3f877508857a6cec07bb9df9d8ce53db4996a3d
-
Filesize
893B
MD59c7505297939ae84d73dfa627de866e3
SHA1eec5fb47ed170abdaf0c0eeb8b8a883fedc1cc34
SHA256e3e7f98d2364e865113d8b3f3d7470388ba20bd2ed0a69d1b095aaba1ac1eaad
SHA5124121adae44ad2ea5e928c4aca17073e05227faf43da2f85476db5913e0dbd363694a7802f5fc13012d4b744e74dbda689834ac3235a4dabb22e27a9482da3a55
-
Filesize
5KB
MD5332f9f22815c80f670b6ca1691aa1f7f
SHA18e11c15294bc8b99583cd59a9307358e26038ea6
SHA2560773e5d3187e4d6301a3a78c92ec035c8428a4099ca49f160e836174eccfb199
SHA5128a5bdb6a319f67a85eb6887c269fe982296220517664b2030474c994f447b0b4ac3b4c2ba9675533cd1dbd2a56246d8c0aa60a087ba060dc8289585aa080b4d0
-
Filesize
6KB
MD5e2b24aacb85fd0e32e4fce26704230d1
SHA13b37b7ed27e3ec76ab4d009c5106fa8da3adf3b6
SHA256cb20dfe0f1294f5ae0ffd67a9ec4dfb8fdf84269f8cfd5d6f1b11f58e7fa2741
SHA51225117507facced13083b18914657f96e248dd4a644501de04d6d2fdd3ecd645b4229fe5688b3b0ecfe818cb136884dfb55dd2c52b4707767950e0872f56b3056
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5abc61e582bdfde3a8e0ec25c853f1ea0
SHA1051098222d9062494786fe49522cddd0815becfd
SHA2568c45df37fc21c342eaf9dd7da0948dd91e6b7034b33d5785ab984af2560ee40a
SHA51246d69bb1c61533b82df4333905b2aaf1d3c7d088d19af515154464f102866db346fd36b65ba966323c52bac61fcfac8f3e76bb75ea4bf207dc30fd7e660c76d7