Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
eabf259511a1cdbe1cc8c399bd945cac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf259511a1cdbe1cc8c399bd945cac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf259511a1cdbe1cc8c399bd945cac_JaffaCakes118.html
-
Size
1KB
-
MD5
eabf259511a1cdbe1cc8c399bd945cac
-
SHA1
591cce48364e34314fb68e9a8428652da313f4eb
-
SHA256
b66a21de95d078b3ea6ffc0e82077a78999a78fe583edf42ae49db799590cba3
-
SHA512
6f100e3cb86f0ee5e10df93f37c1ab9ddddd017e672851fd861583ce30d1850577b4f9222fcba6a4c7564816c8b4a5823d986399465e2cb858735d6cc6ecb784
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1612 msedge.exe 1612 msedge.exe 3936 identity_helper.exe 3936 identity_helper.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1668 1612 msedge.exe 85 PID 1612 wrote to memory of 1668 1612 msedge.exe 85 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 3832 1612 msedge.exe 86 PID 1612 wrote to memory of 1416 1612 msedge.exe 87 PID 1612 wrote to memory of 1416 1612 msedge.exe 87 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88 PID 1612 wrote to memory of 1896 1612 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabf259511a1cdbe1cc8c399bd945cac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2b9046f8,0x7ffb2b904708,0x7ffb2b9047182⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12139966172897794385,18236990444370631443,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD54128e1da17da0ddd5789870897051eeb
SHA113facbeb7ec795b50fd37823929963f9dd981fc4
SHA256349eaef82c4ff6a2d4c8c80fbbd112ad93f2e740683d776515f1d80e97d5edd8
SHA512cc372225160441be21e6abf9b9cb625937ab142f31e44c10d13f4c27c3ef3510b3dd6626c67beebde26ed7e02a1ea2c7376c2b8b0d2bbfa0e3472f2b71010ee7
-
Filesize
333B
MD5454a117ef89ce7271b4d0ad19f7383d9
SHA1840ab1b206efcabf3b816739c9f407f68776c8c9
SHA25623598b004bb03fb92502b248186f9284e9a186d93b747a761412cca5c52db489
SHA512d237c2c12ce87bd6a27228a94db58a53c74de3e7b6e688aac4579d4b2027167d013e95f3bae0243175c72a8b3f662c0b265de934ce619a30b96f1f027add745f
-
Filesize
6KB
MD5f8859d9410580e9c1e9192cea8a535a4
SHA1d3b1027e7bb81802fb8562c4d62aa0701a107d47
SHA256443e4c42c47610b26bebef8a223596f16d988c79a05fd8ef00f28dcc7304700c
SHA5125308c75c23fc4716f916b982b3cdf7df5252df5c14307f283c2bf2cfbee41b78354c4989f4342a8915c2e4f1f2a3d3a90c6b43871e352d3788596864576dee4d
-
Filesize
6KB
MD589cc21f17c6ae5298c4ea1fd12e549a9
SHA1b16340621afbe0514f89a082944d70d263b50cc1
SHA256c5550c8048e9241c56a7d0c36216ab6daa2f8861be9f2811e8bc9d91bb36b339
SHA512e13b98f89003e42f63b853f78ef8815b82dd528ce3287718b01d1a7ec37d9ab855cdf2f56ed1a278ed759f50c92d480bb8f60db6b31ef342effb7e05b025ab4b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a58bc0fb556cea463f8f7be0e72864ef
SHA12658319477acadbe9169be2055df444926979d94
SHA2566355a83dee0419bd91484e84d8a50937fc1e09c41ea4ea5ba9840e29456817d4
SHA5126189abc41a2375e0a2ec15d81e69faeef695968eb7b9fa313429d5ad8ed6f4602743fa62e7932e7a58fe5f976ec972677daeffbca91d1e73f09ce3b7e093e9f7
-
Filesize
10KB
MD5a12d1773486394c8a3b8be599ca4b844
SHA1cd62fd15f9e54f214c68054b4c824f5e27e9449e
SHA256256468cb200e83c07979234b20281379fa06ace3bf9e802a37b5a65374e2e56d
SHA512a2030290b93e8473a64be6d120c36c9ba4fa1c68959df834845eb370036f30f2b140abbe1a18515be3d59adfe49e2770507d40e38a32d7856999e0c1f3badce8