Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
ea9a2f2462e08b7ef2a80d0befcd95f5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea9a2f2462e08b7ef2a80d0befcd95f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9a2f2462e08b7ef2a80d0befcd95f5_JaffaCakes118.html
-
Size
24KB
-
MD5
ea9a2f2462e08b7ef2a80d0befcd95f5
-
SHA1
8ee553dc74e6d2a178e8729f1c8d078f0924c9f4
-
SHA256
27aa50575b4941db6ec689e411cb08194524343c04aed8f470aa573cb89f537f
-
SHA512
569051cc735edee34a74345d3af7a2610054375d4ffe1924fabdc1f1c45264160f13d86c9de63807ba3877a3a822c2d920c10eef0b3e9808e6876b1384c08e90
-
SSDEEP
384:o9euTQDmkaAPAvtdbsbT2/1jR5Va9vr5dXcIHKK:o9eudi4vtdb8TiedXcIHr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3264 msedge.exe 3264 msedge.exe 3124 msedge.exe 3124 msedge.exe 3640 identity_helper.exe 3640 identity_helper.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4508 3124 msedge.exe 82 PID 3124 wrote to memory of 4508 3124 msedge.exe 82 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 4324 3124 msedge.exe 83 PID 3124 wrote to memory of 3264 3124 msedge.exe 84 PID 3124 wrote to memory of 3264 3124 msedge.exe 84 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85 PID 3124 wrote to memory of 1404 3124 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9a2f2462e08b7ef2a80d0befcd95f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb08a746f8,0x7ffb08a74708,0x7ffb08a747182⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,11437521253906740120,14523182508945115291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6e00a627-473e-4909-874f-259f9a222616.tmp
Filesize761B
MD5d9eb2c3823f621b1856bbbb4d8d4d887
SHA11161d4b8673b854c586058b66ddcba26c32cc2db
SHA2569776b6121197eef3fb6c4d625e0600a67640091fac4dc6d8e64502629b03e09d
SHA512d95ab6e4942b0978f7386c4d945f1f758085f32c50ecd1c27b29d55cd15ff979782406a1c99b2ee6fe55766789203cf6114cfac80a837fcead18fb8c06d6b888
-
Filesize
5KB
MD57848c445a9c7e9b6bcf2147417b100ba
SHA1b2bb34b6f6858f46fabca0182f1fa9c4ba842aef
SHA2563615770c846cdd949581ec6e655be01a36fdc3e3e35abc7829252f1f3a098b89
SHA5122db4a4abbaa810ee01ad0853121e86d8d4f39c872a6b16b579a70c579d8152c433b575e588019ac807cf88f42c812134ea25228886eb3f0a168b93fc3b015225
-
Filesize
6KB
MD5a142c782e295af9663b847545dc0eb6c
SHA1d2645b327b8663bb7a76a65d2559b6a7a74465f0
SHA25644c505a524ce78a1cf35b729fdc7407df1f590152bb8f3d34be68cef1389ed76
SHA5128b2d76e5f5a68bcab085911fd0f8124ec498ba96e5dca56f29ae905c939593cd7d567e3b6dcd265cf4195404bdfea681bcb2bdbed14650591d31b6873ea6e216
-
Filesize
6KB
MD583e9202550070253901edf9df8c5b742
SHA1e9f4871cabfb469b56aec8bea4432bfb6cf625e8
SHA25641415a95b5afa9514ed32f27fcb016002e966f2c55069e6e1ca5e6bfad905fc4
SHA512fe16067bd7adbe7ff3a6a3fdf7a9c2f2c423ee4fa977582a54e75c1cc519cb0562a29aef339c96ea9f46e79672fcba6075585b97794c7da727c1e020ec173744
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5840c4975aa546f0d3096c109b31125a4
SHA1292e1423407c0a19e913f960d875d0289b3145e1
SHA256330d3c950abde94375d4b933e6736d95369c4a8b8912c554083fa20998bbe56c
SHA5123c48b52c6eb22c5aadda1d65bdda4852465506c1c29d979aa97b3e0bd6e3f5f0acb76223718a58537442a746517864c015244a766aaeeb2c813aeea4628451ae