Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html
-
Size
139KB
-
MD5
eaa7babecb80e7e5f1d27e295eedf496
-
SHA1
97532f1f45a3d97491cd7bf2d2ddcf471db431d9
-
SHA256
0443ee11b8e997689c34c638d264ab818123f9c747c108ccb0b197aaef26cf54
-
SHA512
31ab352a7821c1925a4b9fda5e587c167ae002289dc91bf2c20480976a9b7ffc07a37e5cd356a7b61fd274c595680115cc9b91af65b29c6f8bfbfb3637aff91a
-
SSDEEP
1536:SdT/MVleLUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SdLwyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 1364 msedge.exe 1364 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 3224 1364 msedge.exe 82 PID 1364 wrote to memory of 3224 1364 msedge.exe 82 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 3436 1364 msedge.exe 83 PID 1364 wrote to memory of 4952 1364 msedge.exe 84 PID 1364 wrote to memory of 4952 1364 msedge.exe 84 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85 PID 1364 wrote to memory of 5008 1364 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9ab746f8,0x7fff9ab74708,0x7fff9ab747182⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14329464114309567554,764271488642136535,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14329464114309567554,764271488642136535,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14329464114309567554,764271488642136535,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14329464114309567554,764271488642136535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14329464114309567554,764271488642136535,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14329464114309567554,764271488642136535,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD59ad8a9c7033e130269ddbd1cda118b47
SHA11e526d8e43b9c107b233a4601e129f90c0905895
SHA256c26a16e5cd0e7c0253bfa5c24442562856d0d673964e80507bfa756b7bba3ab5
SHA5127543cbb58afe5366d64e671e49dc814787109f248367849c95855ec737bf3d9c6e06bd60b46ef934fcd4917c1f47782a1b7cc3744f7840886051dc5455966f3f
-
Filesize
5KB
MD5c48a7ad693bbf5f7ba7c0bdbd52ee7f3
SHA1f0ab83172321070395f8f5849f059036a3e9711b
SHA256d75da32f45dd543dba18a5be26daac9602a7833d0c840035f6d1c56e7ca25d30
SHA512a6e56244467d4bebae0cdc7b210af9795e42bf85c6fece25d1335d32868c1aee9608d1439136ef2033e42f24500f0206497acf10f6b0e68279404ba7c4825602
-
Filesize
10KB
MD5634a69155a2ffcc63a1e60c3e028c099
SHA1c9bad195795dfd239dd3eeceb25f48317587532a
SHA25689bf22b85e06d7a90286676fab8e4c3b3e8a342710d49ffde533d1dc5c5f60ad
SHA5122cc180e195b7d4f671a5b4bc45a5835871c441b170e3ca91895333473b99a7694a45127f9c6d93bfe8eb8bec2134ac55fa534c9d323116bdb0a6c5d4c4dbf0ae