Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
eaa7c891b73296b1866d9d1eca87aad0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa7c891b73296b1866d9d1eca87aad0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa7c891b73296b1866d9d1eca87aad0_JaffaCakes118.html
-
Size
69KB
-
MD5
eaa7c891b73296b1866d9d1eca87aad0
-
SHA1
3077a40320c8cb87bc16b70d6e1ba58b7b5ccdc3
-
SHA256
0482800d381746a9664e71a381b7a55158bd3a80ea8e1f2ec751e6862ff5134a
-
SHA512
b472bc4fc32b00c41b5614dcb26740e1ee6492e13601024053c69d9c332a5dd480d71e92ecaae903ea8da500a2f0359eddb32b70bfe028fc374afafcd4877a33
-
SSDEEP
1536:jUkuMXfH/UFHEWmf9b+/a/DHscrLz/TE4edd5KS0mTtNW7m:jaMXfH/UFkWmfjcNW7m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 2324 msedge.exe 2324 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 528 2324 msedge.exe 82 PID 2324 wrote to memory of 528 2324 msedge.exe 82 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 2876 2324 msedge.exe 83 PID 2324 wrote to memory of 4276 2324 msedge.exe 84 PID 2324 wrote to memory of 4276 2324 msedge.exe 84 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85 PID 2324 wrote to memory of 3884 2324 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa7c891b73296b1866d9d1eca87aad0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8af5e46f8,0x7ff8af5e4708,0x7ff8af5e47182⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1720 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5377703843995468288,3657979241824271350,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
184B
MD575580ace24347eb3b8968ace1d7eb252
SHA11389a7b155e636a9d5732188dcc6ed282b2afd3b
SHA2566993aad309fa06cf9c5acad1aa85f457979a5750cf15a0869bbac50cb62bb28e
SHA512f078ab3e0a0910c54cb6fc6ade0702cf83e8ae79d55d32e5c05e14145cdc1cd5360002238c4a84a2e14c566ad532230fed9616c122ef1328c20f0b371e9ca87e
-
Filesize
6KB
MD5baf30ed0672363c75867883025e3350d
SHA1f9efc74cacfad2b688e920b4e4aab0f674759eb4
SHA25675fa5ae546bcdc3178aa629ea1334164eff4802d8c38edef3723bc35ac658009
SHA512d0ddee87eb6d9bb48fcfb8fc8d3b3f3856e4f39e442da4460fae97ecb55a9b8dead5c62f12712fcad06f33b9dee4446d399454f89e2a2cd472ad029a9f44b51b
-
Filesize
5KB
MD59b5903e56ff09166a07379432a3ec532
SHA1f76b193fa66b94dce15d89dc3a264b874e3f0f60
SHA256e2f67df91c548336d74491e2fa56f53924a232828424da802072adb3dd772117
SHA512f12ccbe8f892ebf41f26cc3113c5913fa46ada6948b1298693bd7f7c8d0eb319588e213a9d9ba6bf8a2c7519c208f3827530f5c8f84377c3402b06bd8f3d3e32
-
Filesize
6KB
MD5250e6e64110ce9602af2b7399ba7b092
SHA184401295da5e90715fab98e1bffe6c7c1eb2e308
SHA2567af29ce17355d59f243781783a31ae93e03ddb18815c6bfdbfaa92c73127ce57
SHA5126df7c77a27f2ce26cfaff091f33a88817b097a2af41f301ace721f31fbe573400122aff2fe718422bad0014602514059718fb542df5e0bde4da7105adc7d1344
-
Filesize
6KB
MD5c2047e42bebc976fa7cd35db449afe48
SHA1d91651242a3903cbcbf417b9a16ed4d2be9594de
SHA25602614ef7f8ff6655f007a9000dcf7cf6ec3892e5c55a9d4dfe9ff5242e9634ca
SHA51247a0183619d56ce4f3a125545edf131d53331b3ac2faa8b17ae69642062ed2e5ff074abd47280eb40d7d0b9e1dec01902bb3736d89e8b88c5369620b9e03a2f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD554f5a13287c428715df6f01b5496a297
SHA1740e5b83aff6b2f43fce6c779d15729d103f8ba0
SHA256adc8596e9cd6586daee8c12e3a7a09a860970d93d90d5ace63b47e8d4508b396
SHA51212dc189a50e483269bd14b4a4e67330e6338e3af599c48b5e40d6ae2909cf2d09bb51195563590fa156835c9606423134c171cd8dce433e9f7211c72f9ce7707