Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
ea87a2a81bfc48de9b362a8b2766f80c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea87a2a81bfc48de9b362a8b2766f80c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea87a2a81bfc48de9b362a8b2766f80c_JaffaCakes118.html
-
Size
139KB
-
MD5
ea87a2a81bfc48de9b362a8b2766f80c
-
SHA1
ee7fd0f9b6e0f97a3e0635e10a3f87ece8075ff7
-
SHA256
7ae4f7021b49f34a981522f75cc69743793993f3b4cd7d54471d12a0f79c7db8
-
SHA512
181c9d166cef0496a4fa8fff79829d43588b669691e1f4ffb91aff1037cb458b76375881384207c86302fa25edfc28de9fb34f54c0e8407761e3bd21a108b865
-
SSDEEP
1536:S/TAXVly0JyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S/o6syfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 1028 msedge.exe 1028 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1028 wrote to memory of 4900 1028 msedge.exe 83 PID 1028 wrote to memory of 4900 1028 msedge.exe 83 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 4460 1028 msedge.exe 84 PID 1028 wrote to memory of 3428 1028 msedge.exe 85 PID 1028 wrote to memory of 3428 1028 msedge.exe 85 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86 PID 1028 wrote to memory of 3360 1028 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea87a2a81bfc48de9b362a8b2766f80c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83fde46f8,0x7ff83fde4708,0x7ff83fde47182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8164309376165348422,3012115859861965709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8164309376165348422,3012115859861965709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8164309376165348422,3012115859861965709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8164309376165348422,3012115859861965709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8164309376165348422,3012115859861965709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8164309376165348422,3012115859861965709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD538233f731f6e7b721dd3b6c7042d781c
SHA14920e5867b7ffa82fb26613b447d14ed6e814f71
SHA256c5258b006a5d7ff81bca60ed062831376c34bf42e9f57d360d793267997df450
SHA51211dcfe7c793b7ff4b21736e36a3fc8d3c4fa3b9d35ec1692d9c8f931f6457d47a1b47709636ca30a950ff2b015ecd5b6505e860dad23be39c9f0599aa635a335
-
Filesize
6KB
MD500a47663eaf343f85a1761dad9a66bd7
SHA1b35a647ac355cfc43e098c16c0f0ce2b565c330d
SHA256b6b757255f010f936958ab6e686c7e75c3363ab55af0bb107c3868f880299da4
SHA5128656d3aec73f88a2a63cee7b2529b89dfb07d131b42cd03cd074b55c6afb131ced30f379f9d39dfc2c35324f979ee0396965637248a95d8df93ed47474bec847
-
Filesize
10KB
MD5c271d5cb63d40ed99b8a3b9db0b2c1d6
SHA1c33f11657f0da7132e501d122fc65702442fbd0d
SHA256c3bce0e8e8b064cee867eaeaef0562111b24e0b147b7fda5208400f58440bae7
SHA51204f08e45a329879bfc2adc466aeda9dd7d62f8e326a816786fd48e603ed8c76224a1efb535606b2ec6d4f2a9a76ddaf8c2ef747fc4537acfa2fd619ae4cb0b79