Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
ea9c84373c8ba39a45e1ada4e0ce3a0e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9c84373c8ba39a45e1ada4e0ce3a0e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9c84373c8ba39a45e1ada4e0ce3a0e_JaffaCakes118.html
-
Size
19KB
-
MD5
ea9c84373c8ba39a45e1ada4e0ce3a0e
-
SHA1
9f11366a65fa0b393d04fcdf1bddded09374e82a
-
SHA256
3491528eb6c908c34d9482ab2cbf89f755b2cc9347890b114627a4baea68a5a7
-
SHA512
9d0a698db85fc923b36af3539cec4c81ef2f72f263478c03c7f0ca47e35ababecbeb92f9e3dc333b87cf03ec2f83577b86ba4cd4007645b072a9f290eb3b6406
-
SSDEEP
192:9K/ypUhTS0iqEWTKLTgE9d31cdRjVEUVHjqRjVmMQZQLjQZEsEtTSoe2hEczBjqb:4/yoTvi/LXf+IQNwVp55i7imiC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 1968 msedge.exe 1968 msedge.exe 4728 identity_helper.exe 4728 identity_helper.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1548 1968 msedge.exe 86 PID 1968 wrote to memory of 1548 1968 msedge.exe 86 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 216 1968 msedge.exe 87 PID 1968 wrote to memory of 3492 1968 msedge.exe 88 PID 1968 wrote to memory of 3492 1968 msedge.exe 88 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89 PID 1968 wrote to memory of 748 1968 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9c84373c8ba39a45e1ada4e0ce3a0e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb271d46f8,0x7ffb271d4708,0x7ffb271d47182⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,10820175961016747775,1726412680560422602,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
1KB
MD583d1bf01be34e524a436492a9cb8d7f4
SHA1d1abef51198d72217a1cb8db1c921888527d4863
SHA25605417012a011ff33e0da628c7e01db61036d797e7f317f2f39d54389212745d4
SHA512bd38fa6c4d5f62588da338681bc5e60469e3f60762807871fcd6a9f6bccb72dc6e2111f4f505e92eaf0d9dd0d8d246d95533b1eb6fee471887da69c2f057b5fd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5209a04286fb5f4d456b62be5383e2c95
SHA106a6cd3b0ce629df21385c1c77f133b212485d90
SHA256bb1e824b58f205142c8bd148157c51814edacef9e6619f6d3f5616283dd35c7b
SHA5120fb47b57d5c1bc97a8b4313d3c141f1ffbc7155cd8f07c91b71e709d847568cfbdf78338b24cc1c101dd8111bcb1fe97bd6960a559927199dbeadf684d0e3e12
-
Filesize
6KB
MD5fa6b9d2c79f5d7fe9fc1d2f56b2af799
SHA16fbf01c8a9e0f5f30e2d5fe451b79111602ada29
SHA2564484458f50b272697d5e08b8c7531117fe0db6cec63f539206be4893c576f2be
SHA512ba43144ea6e2c71fd9b3a3da8d6d74718af0789e592bdcc1ba77870f643f5d565d4f5505a10e773b5863c318f2d845e33964309788306140e22e3b05a895afb1
-
Filesize
6KB
MD5d2fb94cbad81dda5fc2afd015a6cf18c
SHA1a1fe45827b16e2f04a56367bf00bb1636219e3c4
SHA256c3207ef09aa7c283f951461a7d6930843cd090493c142946bb9c0afa417aed00
SHA51209d1c1087d8d8877e8ad76eb49f060fe4a7acebe06c9aa6df9d61cd40e05efa441da0d0582823abd0c93b5805b30173e0290048ce0b80762898cc90e99103d0f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55cbb609b4aa8d1971af7afe0255f0fb6
SHA1a47cc2f9787936f2e7b1b99789beb674bd41c6df
SHA256cc6cf5079f0cc1e85a61d7d27b464fe7d52f6b8bff2bac31062397036e67e31a
SHA5122fe361f0ee7b1080c1228dce2f02c4feff49f18130bd48b885d709032afb482b5469e5ffb4361cecf35e8941b3aedcbec018388f0cc08917a9a5a14b35abde3b