Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
ea9928cddc0c7df9377b97ae24835e95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9928cddc0c7df9377b97ae24835e95_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9928cddc0c7df9377b97ae24835e95_JaffaCakes118.html
-
Size
11KB
-
MD5
ea9928cddc0c7df9377b97ae24835e95
-
SHA1
6410ec7bfb72a42f36fb4cb6069d37ec4ac0570b
-
SHA256
5b6fe38b27fbb3bfac76f907f60e36c8a4d3b5e6019b70856096099c717bd9be
-
SHA512
fa5e44924e10b6b85f04021628706f91be262dd57a80e77a726ffb644c6461494043748508808e2e31f28951aa53c89b9bc4f8670aa4fcb568d9ff983f2f782e
-
SSDEEP
192:csz7ja0AYS/6+NJowRCVPUyRhYuPikPHb76f:cIvAY86+d0UKhZPiAHS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3852 msedge.exe 3852 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 3248 3852 msedge.exe 82 PID 3852 wrote to memory of 3248 3852 msedge.exe 82 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 4000 3852 msedge.exe 83 PID 3852 wrote to memory of 3996 3852 msedge.exe 84 PID 3852 wrote to memory of 3996 3852 msedge.exe 84 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85 PID 3852 wrote to memory of 3420 3852 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9928cddc0c7df9377b97ae24835e95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffacb846f8,0x7fffacb84708,0x7fffacb847182⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,13170343109835646509,1302427481925762755,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD549d3e47dc1d74b6a95932f461a331f16
SHA1f6495c5340ff1488984a34b13e368efe4f3d0e1b
SHA256b3e8813270f4a9fc197db6e7b4579c6c12c9fc422e503a99b68a6d568f62b0e7
SHA5125e7798d376597f1103c9a123020abb640b43ab53cdd5a47e8d4b93b3a449a7e3726ad5085871f10e5962e3c859fe780d4c8ffb6e0655e33fa3f8d5f54bc3ff19
-
Filesize
6KB
MD5c5a31152d7c721e13c23dd69290e6b09
SHA13c1d12e29cf4da8a32ec76eec7f7b3376f2d5ea8
SHA256ebdd979ddd84c1008d5b65fa45f5ca7ad8859f3fa3ed28e04594a09b5f018389
SHA512fb92b7084c6354f734680e323f37ba0afd955bd4af17a0a77d5fc783df07efb46b6e884ec7bf8cc008a6df5dbada8a5e73a97fc87480019e3721fb77950ea5ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD530cb50e841f5bf05927b992eee659c06
SHA10dd96ff1198d32601eb1b5c37e4417f0831de9f5
SHA25633a32e0dac00d53dedf4cde118a0a45421747ef4f863c4f3d994a4c770133088
SHA51217029cd1d8f1faafd9e43d5a123f617f851e7f40b151b4854e89ee9f14357972395d19a9a25559591ae85d068aa40d32bbde2c677f034eb684bbf6fc4f538d56