Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
ea9d3b2683429b680f78bab2f04878cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9d3b2683429b680f78bab2f04878cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9d3b2683429b680f78bab2f04878cf_JaffaCakes118.html
-
Size
120KB
-
MD5
ea9d3b2683429b680f78bab2f04878cf
-
SHA1
8078e59b9e6601d4f8b59065e6b53189bfaf695a
-
SHA256
97b0927fb12b15e5112caa5a8af55b45dcb9d806e9b659fc87be819abd999082
-
SHA512
e00cff8f6c8344a08e59335eb64865553664899b87eef2f820085f394c35ddcea3e0893b67b14b1b449297f18e592638be2e9b2f332db09e2f10c9db7ba3a1d4
-
SSDEEP
1536:SOALyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCY:SvLyfkMY+BES09JXAnyrZalI+Yu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 4912 msedge.exe 4912 msedge.exe 2304 identity_helper.exe 2304 identity_helper.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4124 4912 msedge.exe 82 PID 4912 wrote to memory of 4124 4912 msedge.exe 82 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 3100 4912 msedge.exe 83 PID 4912 wrote to memory of 1688 4912 msedge.exe 84 PID 4912 wrote to memory of 1688 4912 msedge.exe 84 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85 PID 4912 wrote to memory of 1404 4912 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9d3b2683429b680f78bab2f04878cf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa47c746f8,0x7ffa47c74708,0x7ffa47c747182⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3208 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8851594551499788910,807965813116629816,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD55b77fc0ffe43ef317f6310869e5c92ff
SHA1bc48368e808eaf49c68c4b537f78c70f614eca31
SHA256f718bb0181fb57ad1e11d1370374cefb4445d917b64c76cacade308178f51192
SHA512ca03d5adc0cd5ae1e8c538593b742137b404197e0c4c5d0df0f2525277975d7b62a6ce2b1ea967da40c2cb18a2f3a0415fded5eae5b115c11933e6c56e73dd2f
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD561647974a86c6fb6e86d68aea4875f8d
SHA11bf6c5784531a70c70e51750b80e12d07f79f43a
SHA25669fefb6111959881ac93b324ff74ef2840605df02a98dd13ee04e068d395c66b
SHA5124a3c45e452668a07a1b9addd2469712efc73ac1dd26832faccec33827cc8ea91c96e29fb12c8d5036cc9a2b5870fcdaecfe1dcde440eac2b76f578f46d4eecf9
-
Filesize
6KB
MD55cddea61ece89bea2491e9be19964c9f
SHA1006dc0f9e59b55c46bd5ec1de4e25787501fbc43
SHA2561b9e0fb02345193bb118d245dec86a05470187faff319b232f2d166dd5fe9efa
SHA512c11bec3609359561dd3b5de798134c5a44eea44eb8ef11564dc8033d8736a3629f883f587bc0f25d418ec96ce73893fa649badcdca42f96a4551aef7086f896e
-
Filesize
6KB
MD54166f452902c0e3599b09e6cabb0d7aa
SHA13846e651f75c51c61cb761bbd1ba8bd8737cb3cb
SHA2563cca0cc5f88a9bfec97b568235274641283df4ade218feac1dd3922988708f18
SHA512fd047530c046b66028c24070fcb9fc63711c2eab1f690e635f6fee141df480c888293c77f9ef95748d5d7a4fc97099ceab53c2704eca9755bc799d583ea719fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389