Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
ea9606a9c69d5792fc7cba618711049a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9606a9c69d5792fc7cba618711049a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9606a9c69d5792fc7cba618711049a_JaffaCakes118.html
-
Size
5KB
-
MD5
ea9606a9c69d5792fc7cba618711049a
-
SHA1
9c19a869967af38a43d71eb5015e978506416405
-
SHA256
acc7ac60002e5334edc5b4a9f59e5269518077dec9f089b72de1d9f198ec5b4a
-
SHA512
71ec8c623198bb64410992b0158c7aa31c1c215714b6fe393ea515181fb114cf9845689b4a2a6703b295c5f2cc85d91c8452880fe9767a348e414a3cd9b4bc09
-
SSDEEP
96:fLiw0kxPTSpNA3duXBDSchEs5oJLPjclC8jRl17yPTSpZwv8uTmXmjL8Z5hsVQu:f5hm4NuXBSLPURl1+mza8kJjLAs+u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 2340 msedge.exe 2340 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4204 2340 msedge.exe 82 PID 2340 wrote to memory of 4204 2340 msedge.exe 82 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 1376 2340 msedge.exe 83 PID 2340 wrote to memory of 3472 2340 msedge.exe 84 PID 2340 wrote to memory of 3472 2340 msedge.exe 84 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85 PID 2340 wrote to memory of 4380 2340 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9606a9c69d5792fc7cba618711049a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb026546f8,0x7ffb02654708,0x7ffb026547182⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14763602235611191814,1992355962934206859,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5c6a41abf8d7b7b383453b5fe34f327d0
SHA18773e2cef706d63a7255f0ef52028e6909170516
SHA2565dbd76cb6b255f4f3ec5053b8e4aa7790fcec7576d8676d9e07ed48c5ad61858
SHA51244d3ae5f8fa364fbd23837ce3fb13e801d66bd661b99d9c78c16d8a930c9b1dfb546cb3b89e7b6a042881abc569afd31387b5a5db4d03a1baa57a6e7bbf9cca0
-
Filesize
6KB
MD58c48711ebcaa9d2d4c108da58ccdaf21
SHA13787324daa036d1837c593eeb0da2fbf2f54e2ce
SHA2564132d6a89e52472ff658d7561b3ecd3a0c0728bf600cd1457fd5c300543316c9
SHA5123672ab71bc60ea5d8f121162959250713ca46d6da3b45992e23dc534da8c66a34513faabef4f6df805cb12915dc4fb9ebe904c60fa1de5fdfeb64a425b023810
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD507ef2e9e4300031715830fc1225ef4de
SHA169684f3cc3c4434a8d2ac59f327828f71bd28cf0
SHA2566a1923f6b89264d870ba849ce75f704e379ff3fd1932544a897766ec7fa8caa1
SHA512db2d3a3cfcca27b1c5624efa57c7515931bc0e0e94a1d8605ff4f905407dc788053627d8341fa08e858cfe7200e8641d145f17029aa44cd4c83063144d41569d