Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html
-
Size
840KB
-
MD5
eabf0c3d0999303d40b481e3c2b201a8
-
SHA1
4e893224bdb358b6c51bf7789e84d3e8f2581356
-
SHA256
71f4ddb8e0e08c6ea8b7c3c4218542b0884b1832b5d07b308d017b7c33449d4b
-
SHA512
e8f9c77f62e53ddf13c454e920d9c7837e055af691b141833c63ed854f75b4b1c93ec13e6439d3fb287ab68ba3a45a0a2e435d08e3b9d1afd20efde3b71c4859
-
SSDEEP
12288:/5d+X3ZrscWy9dHn6CD5d+X3ZrscWy9dHt5d+X3ZrscWy9dHv:P+1jz6Cb+1jV+1jb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 4240 msedge.exe 4240 msedge.exe 2392 identity_helper.exe 2392 identity_helper.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4924 4240 msedge.exe 82 PID 4240 wrote to memory of 4924 4240 msedge.exe 82 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 3492 4240 msedge.exe 83 PID 4240 wrote to memory of 1856 4240 msedge.exe 84 PID 4240 wrote to memory of 1856 4240 msedge.exe 84 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85 PID 4240 wrote to memory of 3952 4240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe94a546f8,0x7ffe94a54708,0x7ffe94a547182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1784114598416586456,7835116397259311489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD50d8adf60327544ca95d7e31f71c5a53b
SHA1c0aee123c0fe2135d74cf643e952579b552d2afd
SHA256efdd69928d36aae2024d23056d015703cee5c6aefa4bb4b6afb58b89737ee3c1
SHA512c7375c215810a1fa100d12001f1162c2b7a10fabed49d94d99dd71e640e36c07d8a6d759f53676e10213cde12a49742509a003b71b0a51a44b986ed3c6d09b18
-
Filesize
6KB
MD54b09fb266692bc8d85124d16b615ae56
SHA1f2c2c0bc9a0f5da38f42f6077a4268754cdeb3ff
SHA25621cf5c33563c4b29418a10208f48ccd9bd7bbe5b67da6f5729e8c4a1a515b688
SHA512397107016f7fb4f151eca05b73633c0057e68800b68b4e1b9f44ab6150eb746c22fba987c41df725b8343168c600c5ce846ae20ae7b13e67acec6f47620116d0
-
Filesize
6KB
MD52795dd1ce60d11e9ecf7ece5e68f4563
SHA11321f262e3c2dbe5829a656d3fd98ff85005447d
SHA256dcf9bb5ede022e21a43e91e01f10ba9fe4c6b33e62749de771b28097b933b1fb
SHA512570db2656731ba1395249e2226972d7a9b3c810c2680510be8321890432a64e5fe8ce3c64d99d8f3565a5f7337a7eec96da646b3969a1038902d36f43ee7bdeb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55630e2b35d0bafb99f864c2c566812f1
SHA1415e962ba4a33fa09a006d3dc237f3242c633238
SHA25693b4f65cdd7b0af94c325eab3c2ab1b5e4c4a88024eac88c3039ee5c7865cab2
SHA51203904064c5f06c7367413b28fd19d7b875f5e04514b60077c4ec436fbdfd5142d43edec861572fd342b1aa578ec40e26e334dcadc69b35c53c3695c6ac0cbf6f