Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
eaa88197da31a35928c8ac519364adc9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa88197da31a35928c8ac519364adc9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa88197da31a35928c8ac519364adc9_JaffaCakes118.html
-
Size
139KB
-
MD5
eaa88197da31a35928c8ac519364adc9
-
SHA1
4557a9cc47fb2aeb9738c931dfb32c984e158547
-
SHA256
278257f6c90e9981934a8a273717bbe2ef8982332508e096507380da6cec6390
-
SHA512
952e2b0342ef8e314a7c9eac999040874a0d0ef2aa16d941820794bbb821505120060dda6b728ec9eb6d49e55a13f82924aa229bce7752463a98c98f4098182a
-
SSDEEP
1536:Sz1VfD4/lvyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SzvYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 4040 msedge.exe 4040 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1332 4040 msedge.exe 82 PID 4040 wrote to memory of 1332 4040 msedge.exe 82 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 3084 4040 msedge.exe 83 PID 4040 wrote to memory of 1016 4040 msedge.exe 84 PID 4040 wrote to memory of 1016 4040 msedge.exe 84 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85 PID 4040 wrote to memory of 372 4040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaa88197da31a35928c8ac519364adc9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13ad46f8,0x7ffe13ad4708,0x7ffe13ad47182⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,12352239609378710431,11404854839429775653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,12352239609378710431,11404854839429775653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,12352239609378710431,11404854839429775653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12352239609378710431,11404854839429775653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12352239609378710431,11404854839429775653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,12352239609378710431,11404854839429775653,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5db95161a2d8a56f2158922f8319365b4
SHA1312846bab0e17d32da9fe02c0d477a51d84072ee
SHA256028b4a2054b47822d02f2927a7504026db5d9b95bb100dc0914cc9e432553abf
SHA512ef56b3fea3f48a04598ab556961f7b7d41a8df1d3ac8a06852699f0ae0e81bb787cbc0508487955fc5d0ddbefea59d13d62b10ea2d869067609190f57cdcada6
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5b55f06ebe25646ea4c65d6e58d385ded
SHA158a5654877d5b923310e382989c842775a16cf40
SHA2565fbabcd589abd1b4d7f9df67b7c32b8340db51a6adbfcf75d6f7adb613ea3f06
SHA51234724949f33c68a74964a9af8ca464358322ffdd1b0be8583952b3e66a660d710326dec29d969a5cc62c0369d7a671f9d437e84d60db0b2db02a5532ab65a4e3
-
Filesize
6KB
MD5ca64ee549cd0a416c54be2aa32c6c831
SHA1368ff96b3442eb493b872918c4b1208e11bbaea7
SHA256b33a12f588442da6ce34cbc75c2a7aa3447690129720fdb6528042269ae5ea20
SHA512a5d12193bf3f943f9cd404998ee1efb40ca50f6089bad2c0c24a3887c28d4df819d1d5d81d16edeb634e6df40dc1454412f12ed16aeda397ac0f66b33d9d0a1a