Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
eabfba1884a39e3d6261288cf4110cd2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabfba1884a39e3d6261288cf4110cd2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabfba1884a39e3d6261288cf4110cd2_JaffaCakes118.html
-
Size
101KB
-
MD5
eabfba1884a39e3d6261288cf4110cd2
-
SHA1
0a56574d23857a3758da0e124135803ad9420864
-
SHA256
aa91eae9d482da3a2d8d1b2e614d1c191eb6e09a24cd784a0c5041d34ae061f1
-
SHA512
b423a9b74b8a1f52255b586a6c9262c9d064762f8265c3872b0c0dd69cd695c8fa836e057e64b79633021f3962150cd4ffaadb7a5587d9bd4c2ef77688c31715
-
SSDEEP
3072:x3MpB2HSqC4Rq1c2ZqzSqgEQ5r17bzwuZxLO:1Mm9q1c3s5r1PzbZI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{22E0F536-CA07-4F5F-AAE5-0BFF07D8A428} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 2464 msedge.exe 2464 msedge.exe 1680 msedge.exe 1680 msedge.exe 2424 identity_helper.exe 2424 identity_helper.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2676 2464 msedge.exe 82 PID 2464 wrote to memory of 2676 2464 msedge.exe 82 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 2564 2464 msedge.exe 83 PID 2464 wrote to memory of 4588 2464 msedge.exe 84 PID 2464 wrote to memory of 4588 2464 msedge.exe 84 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85 PID 2464 wrote to memory of 3748 2464 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabfba1884a39e3d6261288cf4110cd2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe746446f8,0x7ffe74644708,0x7ffe746447182⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1788 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=1828 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15285963978417539604,8387077150307367124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
321B
MD5b1a66f80057618e697d26b7685ef2a62
SHA158c0cbb323231087fe1da2b63b20ff78857bc74f
SHA2563bfbde22d210e7156907630c48cd873cfbbac9779f0969f309359aa2743688bb
SHA5121acda7703ce46b1caf38573ac46171f907d1e30be223d6dfa394197d566506758531076a3276499abd267bec46044c8fae882c2585199f4e4cdc084ab383f159
-
Filesize
6KB
MD5c5f8877cee87194e755a1577d08eb837
SHA10d5ec3dca64b1d7b1e20c175aba387c7b1ca8c9f
SHA2563f8525ca30a3bdb03444ba751565843885e4cacedd4aaeed20a2fe0708b4d4b5
SHA5121b559cff9b3ef941a34b5f8515b7bcd31cdffb96ff3bcca8c0ccb64b55a7d9409366909be2c13476d5e7938575caf031ee88746d2d905c6e2293d3e5e26cd843
-
Filesize
5KB
MD5f5d5a46c4a16b8bc089a29fdc0a712e0
SHA1f97a0d640e5174432bfd3229b434ea36581a3703
SHA256db22fdffa6ebccebb327d180055c5fb54ce930070519c81a6da132dc979b1cf8
SHA51226fd1cdd7055225df065993806c49f6ac36abe8cb6e18f917dab12b53397fd01b18cb2b25538075d9b58be0d781f6702f6830957a3a0f372e03bbbae2f453e57
-
Filesize
6KB
MD5cfccdedb3684593fb8e8029fb3b166c2
SHA1c0779142dece108fc436e58d5161c2ee49893c85
SHA2564b7e5703363956dc97d72928cf151e91c1f4faf92bb546bf266405c5f2adcfad
SHA51288151fcba4b17b17baec399bc74284896bf50421603cd72b4ac30dd77c38ad1cd144d23fd85c0d7d86b3db881d0bf274c5275130512151f9c1ae874b74e8a03d
-
Filesize
372B
MD520a5461ded11bad43c1f5418ed5b742d
SHA1b7542605174aec58aee4cd7b593658e18ce0ccf3
SHA2560132cf095c5323d653026161526a3717f1a271eb068d8947b22d73fd5534116e
SHA5120adcfc79ec94078e347509d575af2b4e444ab8c2476dac61610e25c3406f2ff6e51935d6d0cdaefd22a74f2c63ce104b8de912c7e0a0d9d4beee060ee60a0668
-
Filesize
372B
MD54fe42f274de03b5843853520899f0299
SHA10ccfbf727ff89ccee428c9f7277d5f3839133a3c
SHA25653dc2c0a96b3cd937f8731dda21f0cd3051be765f13b41d0079e042d2b8f04f5
SHA512aad6a9d25bd0ccdb4d7b3f71cd02ae6b1e0d8f9185b0a43472bea75d06bea6858fc9585b6ec7ad27304d3c309128e76a27709e60196747bd109624076b783980
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57d04dd025bf8e67a2844d833af54ff11
SHA144888c6958ffc3e5a25465e0a43b64de45153780
SHA2560f6011d0f23d04eba23f3c91c605c79a82e75e2fb33bb5677d79a72d78cbe8b9
SHA512a4f0d8cc2c5b72d3b52f50b2f41b7d12ba6ec648766bf77fd4c993f3e9b35c6b11b293c413c7745d2cd12cf1844e6c43478d7551e778e92c7f75e2cc0ba43687