Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html
-
Size
201KB
-
MD5
ea9ebf3bd088332e0ce3e11806ab2213
-
SHA1
8c153c6d36de2e91f86595430afff0c16a5d6fe1
-
SHA256
a0543ead16e288b59524a519c84da187c43b7fe3b01fc713bc2d69a5a4dd0c0c
-
SHA512
876c628f1cc2e6d299c144ae82b119fb5449c5dd8785a1a8dca56cbc80d51f4db72542c0c4b6bdf82d96d978064c0fff123227df03e3f2092d7a532641e7f592
-
SSDEEP
1536:kaCL88vAAagB8KEdiBYscpnX+yOrLofTK/NnuEtHNA6GvM:dC8nXLmD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 3504 msedge.exe 3504 msedge.exe 4600 identity_helper.exe 4600 identity_helper.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3504 wrote to memory of 780 3504 msedge.exe 82 PID 3504 wrote to memory of 780 3504 msedge.exe 82 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 3104 3504 msedge.exe 83 PID 3504 wrote to memory of 2388 3504 msedge.exe 84 PID 3504 wrote to memory of 2388 3504 msedge.exe 84 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85 PID 3504 wrote to memory of 3696 3504 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb5b46f8,0x7ffffb5b4708,0x7ffffb5b47182⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,955868116026798898,9763782402729585774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD53d5606c7912676dcaae8562959a1bc31
SHA1d6057b1cfef0223063b11f12d3b9683a527683da
SHA2566b591c3f8eaa8224fc417a1d917069761f9cb7120d3d1bf92b5ff9200a7661b4
SHA5128b23eefdcd87b469a4ad5521d4d7b4bd41244e26dc8f25b31b8a4fd8046db12380519543f87c204b996e2776a6f888c1517174f2fa16935861cd003541769f30
-
Filesize
6KB
MD57595da24185d00316138c65a2b261a45
SHA15aaae2197c84147931153212e8ca1aeed67f9da1
SHA256da3443f89a5f717c5a66466f7e5d2d037c83b7719b11dd640e733a6f2008ac71
SHA5122d862486ae97bf123aa8e0ec664478138df7a75efae4b2ffa7a9ead4a985c4e3b2b4e3b23e36a00a66576b524723113b8dee4a56ef1883d219feb7153fa0cb46
-
Filesize
6KB
MD58d28609f9a0aa4d2c81982039a3f9969
SHA1efcc593dfec0db946b3fc921c1ef8f0f65b4f93f
SHA256ad8aa9a03d8f25ec998b5a2733c1af42396422a7989132e466a82c7bc67e02a0
SHA5127d99d63dd93ddad3e75ea3ce28098e326ea0833b0b07ad53e00a7971871e0a7a3d49c3500cc258ec98b2318612274c7944827eeef296f090c55377be47c263a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fdc72a777a012158bc5bff10fa67b2f8
SHA1f0671b84c4458e51ba982a3827eb671ea580ff41
SHA256283a2007c6266969c9124ed3f4a6c3df8d9f077fda3a533a12fb31818a459878
SHA51252b8d3618d6fd08fc209c5725bad8d71f319fe06cb11a7faadf14b7c8ada7d4c901279eaa94897f39a58590a6507402b78d1fe255e7501be0e8e20f3f8adf5c9