Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
eaa6eb19a8f9ad5a6f682643f5d6967a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa6eb19a8f9ad5a6f682643f5d6967a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa6eb19a8f9ad5a6f682643f5d6967a_JaffaCakes118.html
-
Size
354KB
-
MD5
eaa6eb19a8f9ad5a6f682643f5d6967a
-
SHA1
87b1004f934b6b9a3afe3d45809455ed0f70bd50
-
SHA256
70ce3f43ff23bbcd4d96ec4312af7e28cbb1dcf30f1bd1a0d9057d11b0587808
-
SHA512
b95d43c45fb1fe576f3e9f1538a9b83650e12fc42db07089217a49884f299213c23b9b459945b71598af9e6b7c6af5eb84eb967c24548091274b9e79f5fb7a39
-
SSDEEP
6144:ScsMYod+X3oI+YR6sMYod+X3oI+Y3sMYod+X3oI+YQ:H5d+X3TY5d+X3t5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 444 msedge.exe 444 msedge.exe 1088 identity_helper.exe 1088 identity_helper.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 444 wrote to memory of 1084 444 msedge.exe 82 PID 444 wrote to memory of 1084 444 msedge.exe 82 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2168 444 msedge.exe 83 PID 444 wrote to memory of 2892 444 msedge.exe 84 PID 444 wrote to memory of 2892 444 msedge.exe 84 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85 PID 444 wrote to memory of 1728 444 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa6eb19a8f9ad5a6f682643f5d6967a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5b8946f8,0x7fff5b894708,0x7fff5b8947182⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5265577641751422591,15879014604538794314,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
5KB
MD57a12969150a9565b0f241c382b8e902c
SHA15d7ad241c78a0ffd0ae736490fb628a58eeacf2c
SHA2564a5b32b436d8e0e7833e7ea939804e2369ad8ff5ffc6a3458144acaf095c9efd
SHA512234a0eccdf6e99bcd93b26a7ba4f45451ba243a366572ae795831075ef555e7021cb6a723c6d00f953c2f82ac05532e14d90492f5f772f8cee6522187f0ca9a7
-
Filesize
6KB
MD5d3e561f810319c8c2d8af78fc87ad86a
SHA12bf681e51525374f101ac2f2c23d021a5453653e
SHA2561dfd361bf31228d1e14be8aea6075efd176b92b87f9bd36b6643c290d6ff138a
SHA512bf9bcaaf08fc436f715ed95d11e352b9ef04691751aed8a3ce965863a9a50a0b78b57c7559ee1797050600103c06cf80fc25d7ff74ea24e52835b9428bda4197
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5dd3cbe3785022618217b8814c67fd4c2
SHA1aab1c336ccf3d6c0507bfe24d6d4a0eb87f08a57
SHA256a44b476f1a34309d1b6c41037a7f2a2be922fb04cd490e138dc18a4853b91c91
SHA51205140e26be6635607cdfd9dbe6ba83d7cf99ffc0b4c1739ffe9daf6f9c68328ea58c9a79de62ebb720b2527ddde2c7106dcf566215f1e9322405f64be065260e