Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
ea78b447f77be744b99aed7669f9fea0_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea78b447f77be744b99aed7669f9fea0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea78b447f77be744b99aed7669f9fea0_JaffaCakes118.html
-
Size
3KB
-
MD5
ea78b447f77be744b99aed7669f9fea0
-
SHA1
cb023d37ccebe41258c9f779588c24c4f8b3fa96
-
SHA256
9cb323c29f16080f047afe0d45af22472cf799b8aab492809d2b0b9f93c8d639
-
SHA512
898599dad7fe0180aef8232409d7d19fd99690e12c6f51b414ee0061952eefdd0532267d4049a432859bea24ec7e1970ea3a0b79841a9f8705415ee89b758b7e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 2012 msedge.exe 2012 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1892 2012 msedge.exe 82 PID 2012 wrote to memory of 1892 2012 msedge.exe 82 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3300 2012 msedge.exe 83 PID 2012 wrote to memory of 3636 2012 msedge.exe 84 PID 2012 wrote to memory of 3636 2012 msedge.exe 84 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85 PID 2012 wrote to memory of 4484 2012 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea78b447f77be744b99aed7669f9fea0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0b4346f8,0x7ffa0b434708,0x7ffa0b4347182⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7136485089751202253,14793302400537292223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\449a23c3-8236-45e3-bd63-f7c894ed2a15.tmp
Filesize5KB
MD5652d1ab02f0a17752dd19db10f652539
SHA185e298b75d3d223a8834ff533abb35f6998b1002
SHA25665cf86bb8c618eea777e85c053ba82be861ab2f0dea0af67dfc30d04143a2b8d
SHA5128e1f25858c1d7aa6d4f007246eacc5e15e0590bfc07797f7c82ba91a3ee375ef5850f8091edc24c5e2b6004e28056a5388664537f56c6b4a6af9dcc52e6ac50f
-
Filesize
6KB
MD5d05fc55c03226d56e212ab5c9b78b00e
SHA1906bc2f0813073371afcbd44127cff7b4226458f
SHA256425187f19f954587e82af084555d854340263b823dc0208347c3e1d17a1414dc
SHA512109290a63a3e669a175c6fca7b72767cbaef8c454f149cdaa8232d44175089d90907848a248cc8c9873aedd2d25de8749bf19a0f947d4197548c29fe4d2d208f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f930feb417f01dbc8c59033eb2a5ad56
SHA144ad816f3eec4b05154665a27c1b246bc4ff8885
SHA25612f672e889e8f50e9df629946eb16a5ef0c986cbade2aec4c3f7e2f5917fb4c6
SHA512f8a96ccfd3605e4a02c3673d5db3ec5870c85c2f5178912dbd564a127a4c5e54b4847b7526ecce67f842c83e1fede658b0f4adbb942585ce4b58837c2301b529