Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html
-
Size
1KB
-
MD5
ea8af175304551ba5810eabc536a0f50
-
SHA1
3f321d22cb461ecf51e1c8658bcf24dab8c1c8dd
-
SHA256
79df15a39c944535f69c235dfe53aaccffaf2e17f862a4c522aac9b493b704ec
-
SHA512
21fa264a51fc30db3abe04f50ea25412c8d72255f7a6c193d87db9f80c3ac7a3eb39f64b6999940678109e3835116096ac7da22c06802f582eb54dca6ffe3a69
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 4572 msedge.exe 4572 msedge.exe 4692 identity_helper.exe 4692 identity_helper.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4624 4572 msedge.exe 82 PID 4572 wrote to memory of 4624 4572 msedge.exe 82 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 2724 4572 msedge.exe 83 PID 4572 wrote to memory of 3376 4572 msedge.exe 84 PID 4572 wrote to memory of 3376 4572 msedge.exe 84 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85 PID 4572 wrote to memory of 2804 4572 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe955646f8,0x7ffe95564708,0x7ffe955647182⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8304227247488513191,6345615610122276740,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5986edc2d1563f310ed758f91b9fcd4b5
SHA11a2dd40087e5b3b7e3ba7854c56706979d140f2c
SHA256b67b886f31a34169f73b630a74584e810cef23da082f3c3d29b648538db95688
SHA51221c8b35ead55b1a140be448bcc3a807a313c41f5959c31da61353a9bb6b58367668fe0d1a6ff9d9059c84f528360b4aa586b14c97a4104e7e7359701e3a944f5
-
Filesize
6KB
MD598ee0053cda1a263add9e68df777e97f
SHA1ee9ca9106eb2c97f641e7fdde9ec7f05b14c96e2
SHA256246246a52e5fa6ffa60fdb49da930cfc491ca310a21cffca10385a912c9487ca
SHA512c24b96252f3fb2648db907bf3fe473ac37bb213cd63a06ef675b2a593e6a02928dfc678267e678f15a9b65a71c2622608029d2f9ec50a39456f80ed5e1ca2f9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5894e74c8b1866144a4c511cef906ec23
SHA1f125a5ca1438ef104b179d37c576769676695329
SHA25624abf55a6fcb68d245ed4e54ca348c055255bd3994eefd5e767f24ba37a5aed2
SHA512355ed5902b3bc0b803b9220ee9d7a99dc674909a669dc6052bd69bd73dab617be54031f3275bd6fc0ec74b023060b4e9fa73c56d4e9600257a053d961192c8e7