Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html
-
Size
201KB
-
MD5
eaaa18af33dd71d4c3d0074519728ce5
-
SHA1
ce4c35c8c464f7068e9d040b1082aebe2a3518ca
-
SHA256
4ee1adfa026d6e1718d9c6bbd6faad51d620a31dabdc336349ccbb38ab8ca0cb
-
SHA512
321ac9789d0decf8e3ce4300eccc080a012f86d38468ef6af8087c27f894980af016e6d8d70259e701cc9f571a0448a877fcdcea5bb06ea75ecfe60989cc055c
-
SSDEEP
1536:kaaSDMSC7zNH3xi5pcZ0YBoOqIJg76m13Cf87epqGvM:da129
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 4988 msedge.exe 4988 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4344 4988 msedge.exe 82 PID 4988 wrote to memory of 4344 4988 msedge.exe 82 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 2832 4988 msedge.exe 83 PID 4988 wrote to memory of 5064 4988 msedge.exe 84 PID 4988 wrote to memory of 5064 4988 msedge.exe 84 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85 PID 4988 wrote to memory of 2220 4988 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce45246f8,0x7ffce4524708,0x7ffce45247182⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15758186284121211907,16453949967614047165,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\22447aac-d0ba-4089-adfa-fbb80e4c7459.tmp
Filesize6KB
MD5b77ceac06f04a60b4cf2be5f2df3bf3e
SHA14b5ba7decfdefb326b3466a16964460a026ebe29
SHA256efdb0f8a7096495ec64424a48fed715dfe3cc4eb00ba36eece3d77e54116346c
SHA512e8ccc946f7458462242cfd6887fa81446e4cc7d83deb455bf7e0bc04710cf38359c026c7876d3e12250a495a54ff189516c7e3524689ae86a36f8639bb12da42
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD57311248eccd75f1b388d96972fb58706
SHA11607aee5d907848537a65f4f8f196004cccd667e
SHA256362aa07a59afade20370868fc4f0d46ec6f0b9f79d3c66a76437b2f44df9065f
SHA512b27a7fd50b287cdf74aea4e6cb2202cfbb3b8a1a4427ee51fa08a27bf59ba0c43e566d96dcecee9f698b6ed1c755390809802e4aa42355034887897389273a36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d769a41f-02a7-4b29-9f1a-59f4775bd86a.tmp
Filesize6KB
MD50126e768634c178e03ba7d787bf3c849
SHA18d6dc09f63dbef00e50ddec44c3b83cf8f35f702
SHA2566677b2cfbad8ed2451813d8382c739748393c43b7e4f1fcf070f2930acb86388
SHA512bdc59b47d3ff406b368da376a001d7d403443c6693fbf6ab4d2d51095632f578e03a1f7b8629e614f85640707ee3109d21fa3401d07f00d5faa74e568ff9bbd8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5f2a44bc437ff8cc5f904ca56e252ed28
SHA117d62614d2392f34497ec769feda3dbd2334ac4a
SHA25626530fdaafee5506529635bdb896f9d5894c5516f83283b501a5997b1648ac73
SHA5128ad1f89fe6caeb405dff1e47b4b6dff8122fe284e5cd34df88f770e513cf2d434aec16213d387b93ac059611e57eb580522841ba62c63f7192d0687ce7fab4e1