Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
eabfc1793732c501d59e75e7f77b8bdb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabfc1793732c501d59e75e7f77b8bdb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabfc1793732c501d59e75e7f77b8bdb_JaffaCakes118.html
-
Size
60KB
-
MD5
eabfc1793732c501d59e75e7f77b8bdb
-
SHA1
b55cb1da2fab76a46c040f6690d6cd04e0c8d64b
-
SHA256
3dd912e12b757e122f1f4fcf081194214f705a6e89e3be26e3476c39dcb8f8f4
-
SHA512
60f7102ce70adfde093b53292f66b866e0f3dadd3e16771d2b4821423e105a4ab373f2ce4ef4751129c7ce664be9c92a72061cecaa140b78e2a34f6d12536d68
-
SSDEEP
1536:PXvUvex6ItSDMwLSPB1aIwuIUm3eyUchJJFtp2Kf/6FsLf8/xgg3r6n6ypE/3abb:qQ/r6EE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 892 msedge.exe 892 msedge.exe 1776 msedge.exe 1776 msedge.exe 3396 identity_helper.exe 3396 identity_helper.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4708 1776 msedge.exe 82 PID 1776 wrote to memory of 4708 1776 msedge.exe 82 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 4824 1776 msedge.exe 83 PID 1776 wrote to memory of 892 1776 msedge.exe 84 PID 1776 wrote to memory of 892 1776 msedge.exe 84 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85 PID 1776 wrote to memory of 5108 1776 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabfc1793732c501d59e75e7f77b8bdb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa47c746f8,0x7ffa47c74708,0x7ffa47c747182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8061529226375921954,8447786574881048013,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD54092e330b4201c4a51c48e551b7e4db8
SHA11daef66f868b82bc4a5453ec0627ef88675b91ee
SHA2565ebcf5383f2b7de00158fb11d488235c35736b9cecd0d682292b1d958ec0fe8d
SHA512cc8374e432ef6a3bb6a5aade8e23a30e871d5c45ec1609ff10e207a3d0122015230a924dd69dba180ff6a31f4a2969f0b24275c3528eea5abed15b6de7bbdb4e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD5c43153b7113c5efa93432bab53253940
SHA17849c02a0a128abb278407f2be961025d8bf9544
SHA2560c35bbcd36e7c349009f7958b38b4df161198d523bc8dcc22d4dbb00b672a4e0
SHA51245ddbf319285847917612850a7dae95b3b801626f9b7765d6ddb505c17faafc15111d41357264fb7f6b24237989b53d135517f225f91189ff12dc66a1e301382
-
Filesize
6KB
MD59a514dd205e27e00f9e02a191ea69a3c
SHA1eda135131741d89bf7ef943c8ab6f1aa65448d8b
SHA256c5010fe8e3ace859dcbd27dc6d4b4de082b6b61438c6a8f2ba11f520191c0f28
SHA512998cd58a4026fe45ef633bbedd1c8d2f4efae70050b8b5b6afe9ddb199c2eec26a33656ff8b3f1bfdd9b4d3b21b016285b32bc719ec4e63838a93f1760ee0688
-
Filesize
540B
MD5c5c96d1da0f48f837a0a415b4d266c98
SHA1b8d0f662df558d14a8c6350902573b2d075fa4cc
SHA2565f4136e2da05be1e6e33578c62162e9b2fb28e5c831de18b545b2a70d66dd334
SHA512d54a46c83a19df5a4e9d5a46bd810a0ee0d55097699a9a1f4d789f31df1dfe134f2fdadf0d056751bf76753144fe4b92af8899452b73f5ee0eb8c1649bc91a3c
-
Filesize
540B
MD5ed2d3bba19256d75d5b9c8b4228e32bd
SHA1dffe77aaba8fe2709d03aa1eb41a5eb5aafecd33
SHA256b0c601143d1800abbca8e4451d4a590e6e85088df24a593b68e4bb4f377e3ca2
SHA512161ac82ad13979e72fe6bcf33b9ef2d46eefcd660523e6e420f3933bba0221c154923ce24a45a3cf798d3ca4d621cd856a5a74630752948f7cf01419e18b2797
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD576ee2bf9eadc3424655b5a6df71e8212
SHA1360cba1ca6cd7f3caca71845d69b50ac4a8a1458
SHA256d883f2bf79fc273a182f8b6f8be745187bbe1629c83ca0f4027694292f71c854
SHA512b9c83e7393ce7275ab105dace9bab32f69683c3f347c65128a0f796e97aa2ba4b0e6e48f5cc5cf5dd5f28e8116bf1c6a72e709a111af2f827324e2586affbc2c