Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
ea8dcbb6ed21dd37a78b0130e86e429c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8dcbb6ed21dd37a78b0130e86e429c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8dcbb6ed21dd37a78b0130e86e429c_JaffaCakes118.html
-
Size
198KB
-
MD5
ea8dcbb6ed21dd37a78b0130e86e429c
-
SHA1
dec64f67950f6f7a59b45a8d0c73b95e8c4e55f0
-
SHA256
ceb9f9f55eeaac9de4dab469f72304b6a4d82a4c23dab3a9b5da9814d55ccc1b
-
SHA512
9b5afa2f07f73c3cfbb99be413072539b39d551ae82d60c632ec67313488ac5c8babcbe1710e85f944901128d8747d12795355818c9e86626a41962c63de4e1e
-
SSDEEP
6144:ZdprA/9/JtgHtlJZt8aNTmz68T/r0/3Nka4tq3m+Tea/LaJuZtzv:LprA/9/JtgHtH8aNTuT/r0/3Nka4tImI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 4552 404 msedge.exe 82 PID 404 wrote to memory of 4552 404 msedge.exe 82 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 3256 404 msedge.exe 83 PID 404 wrote to memory of 5112 404 msedge.exe 84 PID 404 wrote to memory of 5112 404 msedge.exe 84 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85 PID 404 wrote to memory of 4840 404 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea8dcbb6ed21dd37a78b0130e86e429c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff79846f8,0x7ffff7984708,0x7ffff79847182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,12577872415934335013,7103817246550166043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5256f5ffd6977f0a1954c77277c168d94
SHA100b104f42a52674bff8636c95933b77580019ffe
SHA2564405d694e41a66bed9eadc70bc8d0d7289c2204fbffa600c80ead037a61f7301
SHA512003741e44e588fc582c558f9ab080866a8656508fefff773ecb8b565405966d734ab17499f2ce6b08871f1cb2186bae3cf5b8468d53d14ed108f64e3d7334a5b
-
Filesize
789B
MD53244ba4f11d04b2db907be53de97f675
SHA1efbbf6f3fb01d8f36e2d8d03a006614beff9ef74
SHA2569a9fca34e1a99cb296bdbaccd3c510c520e71429a69dc125d4a30727c485023d
SHA512e029b3e7520a3f4d867a45d5e32909ea02b907f58885c6673bd8a232b97308b0f40a8aa1e144d02f0069057063cdc8ed33a0b2f4ba35c58dd444e8122df89c5d
-
Filesize
5KB
MD5497d6bdad05fe54234d0a4a8f7913e59
SHA15c836c387c1132563f3939ac77f8ad46452cea21
SHA256a479dcaa7f13fe24d609bae676db100209d884677e74254663fbb20bcb4c5f9e
SHA51241424f4429ffae81ae6d119e4615bdd5e582b6115fa42c6de0e0fcf1044aae835d64aac309a46da8e2f3af903a7a5aa8a9305990b632b6c517521cf14e47dece
-
Filesize
6KB
MD5ba39c0fb8ee5246638fd80ca78e26a56
SHA1c4886d04975080f8c9be4dfae0d7d0349faea547
SHA25612113fa6d6b730975e9ccbbb316931c74e904c861afb4a51adc07b899a38fb25
SHA5124f7d34aacbc63c5ea29a11c785f9e454ee81c92fbf619354f666a00ead2152e9557e8e581c6e0f8377222a7ea744c670135d9500c49e019a4e70d3e43e6f770f
-
Filesize
10KB
MD585fc7ff714640facf45aba2c9957c80f
SHA1384add11b1542df5b1e1c913e94c9c657007dea5
SHA2568f6ae7e063dc07f4a1b83d22e3b2209d2114fc29049db4495be98e4b830a9d4c
SHA5128e71d412f7eb28ec346c1ae8bc229ba91861266422fe385760d49c9aace87aaf90145429375dbcb0d6cc6387bcc029a614b734efb57a244ba49c34ff8b882643