Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
ea9f431531b69c9f04fdf5ee3a50a0c5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea9f431531b69c9f04fdf5ee3a50a0c5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9f431531b69c9f04fdf5ee3a50a0c5_JaffaCakes118.html
-
Size
122KB
-
MD5
ea9f431531b69c9f04fdf5ee3a50a0c5
-
SHA1
68da9ea9492c69858d0ff8f9fbb7da63846483b6
-
SHA256
375ad69d65bf4be9b99448c0c12fd7d63406f82ce02810176e652a841ee4c1bc
-
SHA512
b08a55f43de6427bfd3d5a196ba709cedcf2bf1020e96c4d15d02ffc548a69f372ae6e0bf835a80f3be2e22af144f299a3efcf1b4b6585f0e6e2437b8e8fdbfb
-
SSDEEP
768:/xvQi+X2W/sevXHLgCV9mvLsU+np/oOFkhEN8D+rJu1tfoUjtQPtwTAThc:/96GGVPLTLmj2p/oOOq+4u1RoUSPt0AW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 704 msedge.exe 704 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 704 wrote to memory of 1016 704 msedge.exe 82 PID 704 wrote to memory of 1016 704 msedge.exe 82 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 5060 704 msedge.exe 83 PID 704 wrote to memory of 1576 704 msedge.exe 84 PID 704 wrote to memory of 1576 704 msedge.exe 84 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85 PID 704 wrote to memory of 5064 704 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea9f431531b69c9f04fdf5ee3a50a0c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbc5046f8,0x7fffbc504708,0x7fffbc5047182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15642283005888440326,11720068788535994786,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD556b0fadb0f9c963ef649968251fb12b4
SHA1e4d18ade14104e74d09431361c10e2e2f490be9b
SHA256126d9b75b5419ffea72a6036fcedfc9928b6336f181c6c512d2c862a45d79c2d
SHA512cfcb54138320e531f8871f6b63ebc76e8b05d95a1380e03f3e10fca8126a1014059abd62fd9dec24732d14b46c16d6229cb08aedb1ae556ff2f91fe1aa37db53
-
Filesize
6KB
MD5adb66c3e6a5caae095ad3864663bc8b9
SHA106d4d52daeba613e16ce52158a43e28e6c585380
SHA2561c72b67df2d1a6eff3d8d90d668144123db045ea8e9db65404980ed7e8871677
SHA51246dc7f6037542cdeee35628e4da5e701e96a65d20fd4fc05bf746a0f317860f755395a348e90186ad04ce6915f906695428159fdcc85cf490c30e19c7bccf19c
-
Filesize
10KB
MD5042f55eb1b915312e96c1972f0958a01
SHA18b15a10efc584131bf11c7eb48619a40135bc8e7
SHA25671cc3e40150fcd8c79ad18681898d93c5273399182329b46569e305d8131ef84
SHA512a30b1dea1ea131dbb5f722a8a3f95ba897d09297208ec5c3075bfdce2cfcfcb63e8d4f78e085d5810ae60e32333cb9a9e985dddd16ea6b949369c7529a321041