Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
ea8e49125abe1c740c0b1edb864ebdd7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8e49125abe1c740c0b1edb864ebdd7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8e49125abe1c740c0b1edb864ebdd7_JaffaCakes118.html
-
Size
28KB
-
MD5
ea8e49125abe1c740c0b1edb864ebdd7
-
SHA1
83169ab1815d6ad09ab6b4060c867aa82d03da15
-
SHA256
aa25c28c979a61a9982ec77873ae9b344273b5968015e7f6e4ee4864f623d80c
-
SHA512
dd6e6474292681e0cb97f3efa9845fc5d3a35e972e2c28a0eda922bcf5d4f0488cb95572277b0766e96489f567ba785e2e5f7fa52dbfdc824588fe04d1ae9106
-
SSDEEP
384:JXBH5PpW1HPOFibz+paMgdtttttwa5cENIWijSGTwWh26Eu:BBHhS6YypaM4d5cENb8h22
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4448 msedge.exe 4448 msedge.exe 4104 identity_helper.exe 4104 identity_helper.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4508 4448 msedge.exe 82 PID 4448 wrote to memory of 4508 4448 msedge.exe 82 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 3552 4448 msedge.exe 83 PID 4448 wrote to memory of 4944 4448 msedge.exe 84 PID 4448 wrote to memory of 4944 4448 msedge.exe 84 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85 PID 4448 wrote to memory of 1028 4448 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea8e49125abe1c740c0b1edb864ebdd7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:82⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,66974127168939776,17756751986399431077,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
314B
MD57f5cad236c013b93defa098b798238f6
SHA1de95435176c788e39ee97720deb45bd8741b0135
SHA256ed46b1a06e310db33e8546c5c577bf6b725f099b4ead7b94d253a3f07b7886bb
SHA512def736df99c8d9ee99f2ff39102de323666b8b7dcafec9fa17872a9abdd381a5399035a133d7812df974905fa7fef7a654d58b60e500a92d3df676263739af43
-
Filesize
5KB
MD5db60ef27d634d84c7161503d48ae4d24
SHA14d0113a7713598c5c51492b3de3be44f7084427a
SHA256ac3e6a509eb6dc2bb030d3d598348010625d5f769627c353ea3d1b020b605770
SHA512d51b8dedbaa790ef7236129816427fd96cd3383d4b2e1ee4a6ce50c9260f9705148f5af4b89dfad1531206ee11377648a3cebc09e20684a3080ad6469e52dead
-
Filesize
6KB
MD5891c8ece6b708f2da052495a368759ae
SHA1147806071f0258fc165b6a82d9c800b32ca9e7cb
SHA256c5fed60a32dd6f09f0c2e8329fb64540e77536fc060fc99af04725d650c22c04
SHA512f0169e161647be4c9f58b2dfd0778d5a0bfd8975718abdadee2c168408636060521fbb20271b2077c0fbfe9561537e73edf3a4102a3db3984a9e75860131703f
-
Filesize
6KB
MD5325840d4b2c69c79f812141e4673bdb1
SHA1fbbbeb0b1f3603dbaf08766de7467c90f86cf62d
SHA25643e4c150b44b250175025fba5621ef1a29b3c39ed9053191ce80904f3df72c69
SHA5122a5efca6d2b858be06c841cef82022a1586f000d8b7be0327225e47533796aecfe3477730cdf12b68d1620f21cb96b17f57a103453a447d2143054a5c148cae2
-
Filesize
6KB
MD54484c300a7a8391da963ff70dccad9cd
SHA115c668b148e007d5bce25651cad4afcb3c827fed
SHA256400010dd29fe13646c53b8bc08b9793fdf4ef03216dd90b4fb0e0ac32da9fb92
SHA5126bd050c25e7a8bca07dada43245c67911ca6e71402478e67b5b90a68b8b4771ce347b58b516dd5f44156cfe42df92fd212f4b7f687ca2e77ee105897d1cae360
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b311d6e6b870fa05567c2d9de93a1089
SHA1333c3b735e70f511b9aa6583ccfcb5687df5c4fb
SHA256f6b37d38b63c67b64fa689ad1d6fd548c6b7d948e449ef25aa685e4dd7ac997f
SHA5122a489225864226776a316cb2558be5bd8ef4ac40e796773c331fe468c2fd577f0f96d1b5036a06673a8ca776d9160dfef6c524bddae8d48d5f8c17b6ed618f75