Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
eaa249b6245552379f91742667f0b05a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa249b6245552379f91742667f0b05a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa249b6245552379f91742667f0b05a_JaffaCakes118.html
-
Size
17KB
-
MD5
eaa249b6245552379f91742667f0b05a
-
SHA1
5388b5fc05d63338517796e9c970ccd0b36473c7
-
SHA256
11f439d6ea2b07a5aafae98c544bcc4c7028716374f73bea5504cf75c2aa0a17
-
SHA512
b7a951e4d4ac3d400959b684bbe8df0fe55d10e762a555c4e19ee2e6567ea2f68aebffbeeaf3e451abb65a667da3a42baa1b29d651d8c28dfe68376ddf28e6b0
-
SSDEEP
192:1I1uEr0u6jv5MDwHjp9rR86iESQ1EI5HT8g0RAMfRnHlsVwKNdHCs4N3FNL4Rr+r:1Ic5RFvTbkMETZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 3240 msedge.exe 3240 msedge.exe 644 identity_helper.exe 644 identity_helper.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3968 3240 msedge.exe 82 PID 3240 wrote to memory of 3968 3240 msedge.exe 82 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4672 3240 msedge.exe 83 PID 3240 wrote to memory of 4064 3240 msedge.exe 84 PID 3240 wrote to memory of 4064 3240 msedge.exe 84 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85 PID 3240 wrote to memory of 4228 3240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa249b6245552379f91742667f0b05a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff381446f8,0x7fff38144708,0x7fff381447182⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,17155036737021224877,14914462077212605313,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD57fbb83fe84fbb63c61ad47769c6a10fc
SHA13fcddae54c0a4ff16e4cacc4e1e332389948f443
SHA256a6b678e5e9b714fe6eca7b52fe6aa54029049ee77805310a01a2025378851a43
SHA512c8a9c9fdc88a493eef616105bc24ed4a491715bd6e06884c78b9ae008306ecbe4f57632187d763baaab3f1147e1fb1fd8cec0abd922ad783ac495f0234bebb31
-
Filesize
6KB
MD5708944d1569defe782bbb831ae695211
SHA150f6acb50818cb2b6f04cd84522be62e84f046bd
SHA256f5daa3e9c27013bb505d4dbdeee8da020f00f722887adc127d8d01400700c493
SHA51286220fae8e2a94045e862c9267f0b0b37571f33b4cecde7c9b1729516571df62c7708539ffc3fcf38b3161222764d49e8303ff03ba27a96b60404dead9dd07c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f11efcd136e484db442e213904b2d2af
SHA13f4f9604ca0b753ec92eb861e85ae16d017a027e
SHA2563490c2785c7a7997721df1dd15394a38b8f83f9ff7f902ae80df6f97f66c0fb7
SHA512eb7ddf0ea02b2803a7eb12b9e77fd7c8f1c92d930061f927746dfc78ce1e19727480e3df312d28dbac9d374ebe6d4c53bbdada5d240be2a05c0bd19a531bc274