Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html
-
Size
23KB
-
MD5
eaa4b289b94098a86a61befa57a2a33c
-
SHA1
470fa9fd7a8df757cd5cedb4d3f93e94190a468f
-
SHA256
d51d3c247f57e113586ca5c6299c4d54fdb92e1d4a1b08927c634bf7eecbc71f
-
SHA512
703ade59bf5d0b3e39ee06842ff362839f76acc1753ebbadea4b14dc3256509e7170a03737f337ddc6df13542355251c8adbf1710271831393b24da0d6832338
-
SSDEEP
384:SvdwGtJmKAbXLZUYg+a+EwMv4Gr44Ky3ASW9pp8B+:SNmnzLZUYgg1p8B+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 652 msedge.exe 652 msedge.exe 3524 msedge.exe 3524 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1940 3524 msedge.exe 84 PID 3524 wrote to memory of 1940 3524 msedge.exe 84 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 3644 3524 msedge.exe 85 PID 3524 wrote to memory of 652 3524 msedge.exe 86 PID 3524 wrote to memory of 652 3524 msedge.exe 86 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87 PID 3524 wrote to memory of 2556 3524 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5df546f8,0x7ffe5df54708,0x7ffe5df547182⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3045790588074326067,8606942661387556804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,3045790588074326067,8606942661387556804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,3045790588074326067,8606942661387556804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3045790588074326067,8606942661387556804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3045790588074326067,8606942661387556804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3045790588074326067,8606942661387556804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
184B
MD5aec2a4c910ad14392138cbcf428361f6
SHA1a42b26e7b015aa63d7c4c28466b2a45d409e91ca
SHA256d681bc517bfc5c4297ecbbb31c08dd477040edcf2e42d561d2e979681d26177f
SHA5126644ece09049a3420045df2ef26b35354636c71ebbb6ee92e23a23988d8552fc36fc8b23f6da0c1116b8935d5221eb034b3a2069bba588fe039507267182fac3
-
Filesize
5KB
MD5e352909508a279d24efdeee2f0763ed8
SHA16d2a2167168d47ce2da26ed45e33a3f616b7ecb2
SHA2566aac312730bacde7f34c7a2904aebc4d20e0facac462bbb74ad3186def876c55
SHA5128de7607515cc2b3cdce3f4f1298c624fd9977fe05d5bf65b66ef9e0e808d4a1ba4e7f09f916d1afa7bcdf06ec0f0e4b54b2c3f2e3f03ef1b6d3f8e621222d0e3
-
Filesize
6KB
MD55b6b2ff89d9607ebe05f4ca9d7820a8d
SHA132407c175b9290a450ce2f798019f55fe24b2609
SHA25684baf2b0f83611c37ad4cc9d970b6acfa294b4cae53ddae7bd0768bc81ffff62
SHA5125a0cd20c42aa7b342f9f9b27b97bf19eb3fa66bc6ed9bbebe1985914bf9c9fdbc382d2a52c2ebc00c0a0df744f3cdba4c52a19985b58bf447c24c5958204d34f
-
Filesize
10KB
MD5335db86eb7ee555731ea3f33c18be6b4
SHA1f80e1c3cd9259642d054c31ff6b2f8e899b91e2d
SHA2562e91816e3921dc473afbb1067ab4515c3b7177ff7c70bd39c54be70e5bddc3a7
SHA512dd43126c1c7c64dc136d3990eddd81bfe701f1d06455ed17909e9204435d721f59a7402589fe0fc44ed683554851c4b0372b18d9320acfb93cfc9e1d60e53a77