Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html
-
Size
22KB
-
MD5
eaae6f7e938b5f5578f7a337bdc6bd31
-
SHA1
bdb8642670601c666817248f8e6b297dde638ee9
-
SHA256
4f6561f7d1f62cc4de0b788a341690699fea10dbd73a237fa121ad0e290a0460
-
SHA512
5c67f3a453f478eb82a2ad407fb65197dbade1394887984eb734afe7b486f0afc9d7e755cd1f1b105cb219c62a22a800c25b8cb844c141fb2da203c925a8ce5c
-
SSDEEP
384:XUpUP/T8CfAbehFn/jIBq2tApBMbZoRA9Y9+kDhM90/GSoEERtTdhYHVVAvHdAZV:k6p0oF/jI1tApCyEaDdM90/GFEERtTdO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 3572 msedge.exe 3572 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3988 3572 msedge.exe 82 PID 3572 wrote to memory of 3988 3572 msedge.exe 82 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 3132 3572 msedge.exe 83 PID 3572 wrote to memory of 2500 3572 msedge.exe 84 PID 3572 wrote to memory of 2500 3572 msedge.exe 84 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85 PID 3572 wrote to memory of 2792 3572 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb5b546f8,0x7ffcb5b54708,0x7ffcb5b547182⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10429605822059098347,12438174291948565832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\937e749a-922a-4128-9af9-49c6b74084dc.tmp
Filesize5KB
MD5d86daf1d230f43d2b8e2e1e7f3a36e88
SHA1423451ba8a96179eeb5594abb680ecfb42983664
SHA256571872d6e032116cc6b483b18382bf87e2d6f9ce0d905df91ce876cf7a4dcb84
SHA51249ce9e2ef0b5659be579b15d945f7c9815d3a99aee241d73a6edfa9580ca45a4e2a3a03f7e84092195195f1a5325e22271dc1b01a072cc369e9031aae1d1eebd
-
Filesize
597B
MD59c15f25ccce3aa63bbe4a56e18d82000
SHA14d3595e43fc1ed51394c7c7a201e7dd0309adb13
SHA256c2c160defc7580e716ea8483ca906e1ac2c049fdcce9549463c2fc899ef76363
SHA512b190ddde8b32663854021358c4be5aba6ad08f5f42c954bdacb9d9e612a38fff9d63f76f8fd7b2baa75ce79235acce6441ea5c434300b772b2e491cf033c8d7d
-
Filesize
6KB
MD5f8494e4ae376778b5be0c87ba406871c
SHA15c2668b361538acd9e664509657e4daf8b742124
SHA256dc78727c509d3f9d3e91192403842737131557a4b13daf8783798d91293c37bc
SHA512ad0668fa34d6be3c1a67e662f1e7fd107d52dc2db7bb831b448caa5e779c30a956255a4605300ee18b9bae7f5682ec6316295a61739419541f8be18fb503dae0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cee07442ef3db1e998ecce51a5b417a4
SHA1153032731d9447362cb3e8b1c0aa317ce670d1b4
SHA256135a6787eaae5d0cf276c4681553957e27b96fc804e6f72670565ce0ef86925f
SHA512017dea25af1b65b5b989317a34bc763931d87dc6c2926e25b37ef54ab6f17896e6584bedf3ea39f1b7cf1c4b9194516ea25c7940943667c8b3fcaf923b24cd49