Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
eaae6f184e42396f4c0aed0d425d3635_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaae6f184e42396f4c0aed0d425d3635_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaae6f184e42396f4c0aed0d425d3635_JaffaCakes118.html
-
Size
74KB
-
MD5
eaae6f184e42396f4c0aed0d425d3635
-
SHA1
b5903ab983cbe47ffa526f6b4a47308eb34f8e5d
-
SHA256
e2d2a87045a5c93b5761c39415a980614c6f8f2dddda9f558bef743ca4a54c3b
-
SHA512
81d896ca886529ce5e7c31150732ea3704578f8681f06816003da7c3fe080230c92eca648535ba61621477439cce5d0b7d9c3ca073a03f59f22a7ad5248f29ea
-
SSDEEP
1536:pgdZ/sBdOjIrDO5g+fzzYoN9Q5YiwVevehe/ezYiNb6Sg2EdpRRz/NAIPpYlUMda:adRsBdOp5g+fz7Dp2Sg2wpRRbN5PpwU3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 3152 msedge.exe 3152 msedge.exe 1776 identity_helper.exe 1776 identity_helper.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3060 3152 msedge.exe 82 PID 3152 wrote to memory of 3060 3152 msedge.exe 82 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 5064 3152 msedge.exe 83 PID 3152 wrote to memory of 1780 3152 msedge.exe 84 PID 3152 wrote to memory of 1780 3152 msedge.exe 84 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85 PID 3152 wrote to memory of 4048 3152 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaae6f184e42396f4c0aed0d425d3635_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadbad46f8,0x7ffadbad4708,0x7ffadbad47182⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,1462739882621079405,10983028198648738952,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
467B
MD57657b54ae55a641f96af98ba2240ee3d
SHA1e3158540cda871f4080e558a2ddbd0572b2a2db3
SHA256259c9becd74985a1b44a47a72ae5a7ba219f13c05978b08add67e7edf89cba4d
SHA512a581fd079e2e4d307bf3b4eb85d36782f0ce49a1c7263dc8c8a12f206acbf75acb5a2955bd973390e6ae2f7c4ff4f49d2f7570b153abaa6d84469fe9afeb8a30
-
Filesize
499B
MD54be7b427474c9da70a2a523922b1ea38
SHA13abfa553880e6f5d68ac74a504947854c03f60e6
SHA256fefc089582a854fef7614e9f8dd59f0cf23f7e479de3de9632602787996ddc93
SHA512c41b1f4f191924ef30d6e36a012291830ce3eb0f00600a5869ed028038eec6c064e13538c4627c77a852153037f188833d75619caef1f1840f367b2964c7a41b
-
Filesize
5KB
MD50510ff7c893d770ecd72e03f921754f0
SHA13ccc7c36c9b7fc06a513865d421da633c46d4e5e
SHA2560c1957f903e5189e59519a46f5fb95fd24e1957c106d72dc004fbbcbede8c3f6
SHA512d95a81c3a850e7201b74b9cbf3aa5c7dcf9ac4b7e6c60aa417442ab4288462c3e7012f261de301466224ec4525ca122460b899209977b6f4f87969732aa836d1
-
Filesize
6KB
MD5afe0b9a128c0b818092f782570ea45c0
SHA15181d6b548e8a4ddf5ad89bcd53eb28e7c03f493
SHA25633b9a57d30dd14d989d3a948c13a463798d0b0b427187ead6a509ebab5f554eb
SHA512849a9360992cfa5a5685e8a40ca0b3d17c58c2ea21aeeb32543a785288706df814cfbcfae2f5e16678576e7e0e03523c845895954a658f5412340fc4e56ce883
-
Filesize
6KB
MD54078b8d9a515ffd0b394e8d397504f9e
SHA1741e2dda7bd8c2dace7fbc3cba20a3fd8fdb756f
SHA25681789d0f1f6912fb139fa6c36c32f12a614dc4d0c3373943695ec92bca34a71c
SHA512117195cf5dd098c4eedc664b4ab7ca10f47a0a1565fb5ad083b9604d6af9bedae226df3bc4da50372f0a978ff0aebac1c305f8857d23a2c2da9248e55c9d70db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53aba6d130a549173a86319ad52f859c4
SHA170c96ccf5a62c9b23701bf8a8da42c6d493e99e6
SHA256b49a03a7996fad72ee9f4e7711550d59bf1f554f6014842346f23b26f36b7a21
SHA512a6f9196de86fd7e0a8f4aa29609a43223bda6d9d7cdf1f62f4b023385ac798f0810b1cb89f42b804d9ba7a1ce692b7ddf3257834063718d16d8829cb3d0c902d