Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
eabe543e37b74460a1ef591a2ba75d2d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eabe543e37b74460a1ef591a2ba75d2d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabe543e37b74460a1ef591a2ba75d2d_JaffaCakes118.html
-
Size
48KB
-
MD5
eabe543e37b74460a1ef591a2ba75d2d
-
SHA1
ab6a36ef20a10f925af51a3e436a30b263db4357
-
SHA256
7a9bec4f7a8ea62bf912b98317ed3347e19441b5fbe4e60c424d3eaeda84d751
-
SHA512
9dcbf378e2cabb82142315fb843ee5087fada625d49d614c7395502ef5230676fc40bd6498e7a4da92f37cee93f6dbc145edc0173fdb5a1e8574f4cda8cb364f
-
SSDEEP
768:V/Vt97Rycy2aWzkHa3Z3McCBTSaemAELdjqckF8SC0/ZuOU:Ht97Rycy2TD3i1ZSaemAELdjqck0b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 2220 msedge.exe 2220 msedge.exe 4168 identity_helper.exe 4168 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 5036 2220 msedge.exe 82 PID 2220 wrote to memory of 5036 2220 msedge.exe 82 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 4836 2220 msedge.exe 83 PID 2220 wrote to memory of 3524 2220 msedge.exe 84 PID 2220 wrote to memory of 3524 2220 msedge.exe 84 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85 PID 2220 wrote to memory of 4932 2220 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabe543e37b74460a1ef591a2ba75d2d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb70f746f8,0x7ffb70f74708,0x7ffb70f747182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,498708027164572718,6707828240895362822,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:4092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
475B
MD5e578a701be88fc52b0c89e7063242ed4
SHA16187f3b213d3d3b861153af84b55d7da1045555f
SHA2563d181e5575499d41cd05518fc8d3e5e66bacbb4339018d7e4e48451f4c239e77
SHA51237053a300a050e44f292c7d7c17cc4ebf1aaa92e6c4bf1f784006e5f0591e40bb0688472bd02230fdf4f05768253ffa8bb5c334e25bda929e0feed7457f60291
-
Filesize
5KB
MD592f2df4619029ca17284ee495c161bd3
SHA1c31926d46674b6a2c0d1fa6483335bd089cd6787
SHA2560075bbb71c43a3fd015e5375df25c648e9ca0e641896a822b952aaf6b54137fe
SHA512fa319b4dd264748ac94d8fb35b9af9fd899dc4108d18b5ec2affea3fe45c7c28052887eebca16beeea3250e5e63aae6dd913d84e3ad476ec6a6c69984ebb3eb3
-
Filesize
6KB
MD57bfecaeb9b6eb6efc9b174661e2baebe
SHA1a896d9304d5324fbe41d8c6e46ba3063925515ff
SHA2561f69304aa01aa33b5344d21c6535a73f45187c4a84433d60641e55a0e6346056
SHA51260b042e1b25e4ffc5afd3fea79119f7f7cb8be273b52eeb36c6f10085d2440309c355ba279f18a4bfb5edfb2799f02b18bf449ef6c20c2494b1de523e21ab2a4
-
Filesize
6KB
MD5ebc2a0c2afb73d25c0d7cb4d2e069e12
SHA16d3fb4e83e901caa28083e19f78800f659e2eb8a
SHA2568f76edc25e6689855762cb0e744e9b56575a647ea503e7d3a125a1770e5dbe94
SHA51207d42e5d8196953d814435e1a843c2996afaff2cda784151cf0ee39f518130ccc28c07cf5305bb6eac6410b7cbd3863497c2117236047d181a1da447d46e348c
-
Filesize
371B
MD5a18d742f2a2045fb72570d77d40f2ce4
SHA1c6794889c4c664db066f39b70a435cc5ee02d890
SHA256f96ed4868e13f8ca3dc0f09c34a994261320a3dad96a2eba793ba13ffb01ce4d
SHA512178d3a0f57aa3bbbec72ce435edc7fb8df1c91f6a9f53a43084b0ea58819bfce469b4ad1d314a9bb6c933439af8460b3d3ca61ac5b52c1d5fe6c198a76f3f089
-
Filesize
371B
MD53c07d6a618305ad73b8ea4b5e4daace2
SHA1fd6c353c17ffd2def99f9ec16036a0cd18afba6c
SHA2569f499aaaf97501974ad59084187993c97c53a22033c2865621defc2804591032
SHA5121401d1bf4b1d60e5cc2d7060eeab0455c8e5455e92499fb761ec774b7547bda413ac8619fc30aac92c5882e31557f5282b033ab75fc4d7aec5cbf8e8bf8281ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD535bbcb57ba5c24fd5fcd78a68531981a
SHA1a564fe71348ac9ebe66f1bf0c40aabc8fe2ec51e
SHA2567a298cc90ea53de8ea19c599b5d2a9b04e077f884d2358203a09f269f9556479
SHA5125ec2fbcef4d90424c1ab7c6beca66d841d26fc9f2db62a5950e02c8e592c2a45df722c738425a3d7f459745118170f30f2c97ac700f1162533f3bf1e00c7ac0a