Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html
-
Size
34KB
-
MD5
eabf37ce4e4c38ea6dbed02bde2dc070
-
SHA1
c2607909e1778ec5aaa571a3cae75d2a8c15b893
-
SHA256
db0a6ce53e6680b45318eaf4684135e9c3a95c5e1bb6c8c33f126a46a95e33b0
-
SHA512
877a8e8e9ca756ef056f90d41a0d93b9ad566bd66a207eabe2752195af828a78aea1c748c2017bac99d1d1cca6c9427d2461c5cc4d8149052b1cee4a533f98a8
-
SSDEEP
768:n7EpFwSXe6eDewe7eIeygjI1VCJC3CNChCICrC/CvCPJExBq0Z24HLx8lFzFn:nwpFwSuDqtClpjIjEWmyP84yiJ4q0Z2x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3924 msedge.exe 3924 msedge.exe 2040 identity_helper.exe 2040 identity_helper.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 440 3924 msedge.exe 82 PID 3924 wrote to memory of 440 3924 msedge.exe 82 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3644 3924 msedge.exe 83 PID 3924 wrote to memory of 3688 3924 msedge.exe 84 PID 3924 wrote to memory of 3688 3924 msedge.exe 84 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85 PID 3924 wrote to memory of 1304 3924 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70fd46f8,0x7ffd70fd4708,0x7ffd70fd47182⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13986891089970764284,16818695670069521241,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
308B
MD52ea7a92ba61cb435379993e397ad6671
SHA159e489f344c172fd480e649161288d98fe87e793
SHA256c0089187c712842268a8d92d4a7a8eb8b5bad965f7d98a6dee198b42ea66a389
SHA5129e0754e632c7f1f1401decec2032fb2b4a9f57a1d1b24b33b94685a729ce26a707ca03e13c976941099a7d73fd5006c4b5a159d8a3fd6a46c1ef460974298559
-
Filesize
5KB
MD5067a4c463afd90d415cec123971f1e76
SHA156fce6c8b649462a0da8db4bdf6c101dc0f8c9ab
SHA256c1b3bd6416278cf5333663e00f73ddc5bc335dd8aa8713a81f2ad0b73139b317
SHA512ca3a4856057732f6c26579bbce55dfaf678fcda233e03884c8e0e65cef8fa3b732b5b071c4fd40a06293fad70f0974327fa61eef0647c75567014149d6fa7f29
-
Filesize
6KB
MD54771b20f83321aefbea36ec2eb451cd1
SHA1e74593d555eb03c793e695f82fd964d3495cf7b7
SHA256a25d68a8716f1ad5ee3d122fcdcdfca34f4a78b98e4e1e05542409c60c85ec57
SHA512285d4d12a12ac3ae86d687e43d57d31546bf5048d3d0da2759efbac9fbf3f1e105eb53044056dc391e31a352b4345682ff5dbd82b5cc160a43847dad3b8fb082
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD567bc0f1cd484916c7860c703e1bb370d
SHA1e2e84348a4708c87846cc6b615f72c3d82bc83a3
SHA256a433b6398e86380287c4d5eabc38e7efa72e8988d434122ad99ef46b629c2be3
SHA51219eb7c8bc642741c5f08095194778010439227d32d003a2f017e84986c9261fdf8598580e9b869e07f31c26e5cf87e54478493b63e78b0b22a56172922a1c1bf