Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
ea7b2adeb4200c541ba6ecf62c4be033_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7b2adeb4200c541ba6ecf62c4be033_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7b2adeb4200c541ba6ecf62c4be033_JaffaCakes118.html
-
Size
116KB
-
MD5
ea7b2adeb4200c541ba6ecf62c4be033
-
SHA1
6d10e128a40bd8e9b9d53e0fcc624a90af996d0a
-
SHA256
387e05da8f73a95378964518f8556d8c6b53889b96eef6f3db01cc753177102b
-
SHA512
1045a2d3866af5a6d8da1e614a13ce064163276d6a0a7e26d2786f513b7b5107417165a99017593f9a8cdc88793bb550bc0ed86678501ece6da206b1231c70b1
-
SSDEEP
1536:r5lzTCdCxuOHdH/5popHIIfKKMy+i9+tBc0:znCAuO9PoZIWMyC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 368 msedge.exe 368 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 368 wrote to memory of 2916 368 msedge.exe 82 PID 368 wrote to memory of 2916 368 msedge.exe 82 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 3836 368 msedge.exe 83 PID 368 wrote to memory of 4236 368 msedge.exe 84 PID 368 wrote to memory of 4236 368 msedge.exe 84 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85 PID 368 wrote to memory of 1276 368 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea7b2adeb4200c541ba6ecf62c4be033_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd45c46f8,0x7ffbd45c4708,0x7ffbd45c47182⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,4553136364590390133,13691243375842593619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5d219889044956287506aa091373706b7
SHA1d414b2a501cf7bcbbe923ce6edb4ac4c20487a99
SHA256db34a02fe43f4ca2a30ac6e60c2bb314313f7ce2fa494dbac6b25f2a776b327f
SHA51285374bdbe0818c5fa625c77aefc9aebdd84bacf6da9f10138820bf7257dee540b660a67410a5f9571e2a3eceb5b3f389c7567a60d99dcfb6590cb1eacccc92f5
-
Filesize
6KB
MD56c08607c8305eeb8090e64d0f4abee87
SHA18b8b54570a7448e4445c16a83dce21b50cd98f9f
SHA256a2b38a40415185089f08c94e068da6507b4c3af8e55928bad8dba58c4530134a
SHA512a14be2cd14a614e431f5ac07a7ff25280d7a889179687b1c185d382079deeb945233ca09528bc1d2286c1a772d328d141dc68ae0ad8bda1b1f744c48a4b76ca2
-
Filesize
10KB
MD5f10e2c04d1f89506d1860a4cda0c5ef8
SHA1ea5b5362c43c479f75b124c90b5f76b94541262c
SHA25602680d8cea3dbda07c6fc1181bce3c9353f86816c47148b4da29e122095b8ac1
SHA512b78fd1f3e8191064b9562487fa219b5d0802f3ec7e75dc111097633a781894364ac246c36492eb07f330b30e88cef1c1f970f8eb03248c1d3de1e312a814fd60