Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
eaadf3e7305d39001b0f3ed4aa3806db_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaadf3e7305d39001b0f3ed4aa3806db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaadf3e7305d39001b0f3ed4aa3806db_JaffaCakes118.html
-
Size
214KB
-
MD5
eaadf3e7305d39001b0f3ed4aa3806db
-
SHA1
a785316f15072b033b6079c839143076409ce062
-
SHA256
f0bf8e2a34853606ff45194bb1334dab389fc489d1a38bbd11f8db584bd268d4
-
SHA512
405a38b740c926400ae3181dc28152291289cab0e0ec90ed9500ca125ae55fb2e652de1613950f8d934d5b8f573fbcef84efc9336ff258cd2a7876287570d1ee
-
SSDEEP
3072:JrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJy:tz9VxLY7iAVLTBQJly
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 4176 msedge.exe 4176 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe 4176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2056 4176 msedge.exe 82 PID 4176 wrote to memory of 2056 4176 msedge.exe 82 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 3940 4176 msedge.exe 83 PID 4176 wrote to memory of 1924 4176 msedge.exe 84 PID 4176 wrote to memory of 1924 4176 msedge.exe 84 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85 PID 4176 wrote to memory of 3424 4176 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaadf3e7305d39001b0f3ed4aa3806db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9795615104640388014,12926708088524955112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9795615104640388014,12926708088524955112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9795615104640388014,12926708088524955112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9795615104640388014,12926708088524955112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9795615104640388014,12926708088524955112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9795615104640388014,12926708088524955112,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD551f11c3fc2568de8a0d7979964d2de28
SHA168fbc7cc0e6f8e7f45494f19bcff46a7d4afc4f1
SHA256f9180f58d1544165da20ce3b846e46557e63d7e208ca3be97a7c66c5e3e41b22
SHA512927c944914debd86a42cda539b21da6f9d69efd944e47ce2320b71263755cf6cb88fee70f74090572a3dccd6c9c70e4f5ae3eb2c447c30182939e660b0cf0057
-
Filesize
6KB
MD5ae7095c2daac20c8830c412a59c94ad9
SHA1ffc01597a7b3e426405cea80b9e13e8964f8c5cb
SHA256cafab5b1f380c84f8948809b9eabbe957d7474699bcea21a63898d4f5e119f04
SHA512269fb49dd27e692110aac5d1370c929e67f130863449639710e827607dfbe4990ea98611d8c2aa5fbe05bd34456d53a20fc87af64128849d8a62100549e7e919
-
Filesize
10KB
MD5e310786014c35397f7545446010771dd
SHA197e408667cd47c9da67067f966e6fb60e37c47bf
SHA256790e68273adf816314595680d1f07e8002ece1cc5bdcc25800f6430542538ba2
SHA5122ffa999954c6662473f0a5535d7b1a55663b844dbd72e45fddc0bf744937b76bf64fdc4c329f5fa985a572d81266cf92dc6cba36c2e60cdb1ade90ac9a3936bf