Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
ea8eebbed32b777fbd2b52bed1aaad2f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8eebbed32b777fbd2b52bed1aaad2f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8eebbed32b777fbd2b52bed1aaad2f_JaffaCakes118.html
-
Size
46KB
-
MD5
ea8eebbed32b777fbd2b52bed1aaad2f
-
SHA1
b44a1eddcba4d668e022ca367621a2f15a9b4f2a
-
SHA256
344951b077b1f8f41f081c827b8bfae1d5cfb6b864c5e512dda1eecdb4ac4cb0
-
SHA512
78c6029f9cf8e5d44c646f4b86d47866650c01137b1aecee917db0aa945b4a88b19adb529ab5117cddf820147244edea577306170ebe41a63b5d10127f727c10
-
SSDEEP
768:cX8Jrpje0DnLmCQHNeTCINrWfc9LX3G1L1MsxvZ9rAp/vED71hY0m:cipje0tIqrWfc9LHolZdAp/vEm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 544 msedge.exe 544 msedge.exe 1476 identity_helper.exe 1476 identity_helper.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 1248 544 msedge.exe 82 PID 544 wrote to memory of 1248 544 msedge.exe 82 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3112 544 msedge.exe 83 PID 544 wrote to memory of 3512 544 msedge.exe 84 PID 544 wrote to memory of 3512 544 msedge.exe 84 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85 PID 544 wrote to memory of 208 544 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea8eebbed32b777fbd2b52bed1aaad2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81fe546f8,0x7ff81fe54708,0x7ff81fe547182⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:82⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12040250055846238482,8004975276295803617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD5ba16446d3d17a4f4aa3c0880fc626139
SHA1dc8508bb58c7fd75a075be5b1948f482691d25c0
SHA25683c4e32b4545e45bd3e673698c9c905a7f9ce02ac5c08642e5ccdf2624c7a35a
SHA5124f9025d959fe3dfb874baa5765d9b46d8b042b6772a4f79e5d56ba4226b872fbca5eeb60ab93c3c247445e879194cd787de7eeb4cef8654ba0452a8601e05711
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD52f37bb9729a82a6c33d997247b511766
SHA12ed5f6ef0ab34b094de488ed4aff3a81b12f2130
SHA2562a4297b199f4ba6ceac4af0677c8b0249d1d76efe5561122f880a271936865ec
SHA512389d6d880594d22e98b371b709d6795b108c772781efaafa111f20b933eadf9a5faa8fd878f2f99fca3109274aa62a860338270d975fdf7f6c117fa4b92db835
-
Filesize
1KB
MD5bb9083468e0babf425ee4dcb54e24df5
SHA1e401b83b7bbbe86f7d6062639dd273e82a6bd476
SHA256626842ad62001e777da68a0324e6c4825884d5943c93f41946b0c6f4dddd0a82
SHA512f2d953c6e7161705d9fb78f30a74e114cfa799dc93d63fbeba16eeefe8a7350e7b1bd1b1b5b793ad83bdf02da59a1c0c3a3edcee2b75d696714dac8da3577a6a
-
Filesize
5KB
MD5e3ed64dcee6fd13fa17baab393a4a5d0
SHA1da21898a9aedfa835f96b153ce8199b74e3006c9
SHA2563ac2247755a85f5d0987673eef0ec2ad8e54d75c704169121e579b72326d2e63
SHA5129e99783d674f67ed88d7cdbf695e37f5e7755f62be7ef8ae50696c3d7ffa114ba9979f803fc695bbafac05f09c87953d6481baf7bdeee199d6f4a6541cfb5efa
-
Filesize
7KB
MD551281f20b81852aeef3d442088e86986
SHA16146ecb3338cae8978496d05815c32e87777b827
SHA256b9d2d4dc99e0d9918acceeb8e76339251d18aef98b82c438f546c284be6e2794
SHA5126f068ebb1242f9547d4e5cb47afd5eee59a694346e5af7f777af5a49b41538dedc455a841aa2e65b272086b608c7522fe9c640e65afb20abef983685d4c2e36f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD546cf1a58f7c6f0cde202a0643b94a02b
SHA1252b44124e09498614e5ff034954f45608728f43
SHA2567e99f290e4cdba76a4440502b58b3ac1b8af9e8cd6340938f980231cc9844cc3
SHA512d74984ed7ab809e9c0c2da8c777c3a32dc1da153d3ddfd033b3b212ff47758bd16a5e37fc4c6aea6fbc4a0231b862c5f7ad19c4646f55d78aef448e5346f2f43