Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
eac1ba9be37f3c39ffccfacc22bc583e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac1ba9be37f3c39ffccfacc22bc583e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac1ba9be37f3c39ffccfacc22bc583e_JaffaCakes118.html
-
Size
167KB
-
MD5
eac1ba9be37f3c39ffccfacc22bc583e
-
SHA1
834da28029d69da22008b30b5ad425823a860539
-
SHA256
ca98e1f39bff2aa8ab0bfffb895ad1adec0d00f4125943178647006269c650d8
-
SHA512
7f2461e486af754bf887e07cd7f15d45fd55799188af60955e93a85b0eb4a7f647d2952d5a235678d9e04936a30d64095f537206bface2aa4c3cb92823423aef
-
SSDEEP
1536:Uh2hI1CkkqVzWqZyhLHMKvvsWOwbalbenOCvSRbhd8XVi5h7Z9xIeS28bEmoEfEq:m2hI7Pp8XuOecQBpTQ4iHpUDXzq
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 87 drive.google.com 92 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 4236 msedge.exe 4236 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1372 4236 msedge.exe 82 PID 4236 wrote to memory of 1372 4236 msedge.exe 82 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 4496 4236 msedge.exe 83 PID 4236 wrote to memory of 3348 4236 msedge.exe 84 PID 4236 wrote to memory of 3348 4236 msedge.exe 84 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85 PID 4236 wrote to memory of 1292 4236 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac1ba9be37f3c39ffccfacc22bc583e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dff46f8,0x7ffe8dff4708,0x7ffe8dff47182⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2856 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9449659354818880736,1573988520335247239,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2568 /prefetch:12⤵PID:4840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5f3301b542751e296e1075730fba81a54
SHA1238cd384bc5341959c4748d95085cb2f59ba72eb
SHA256d79a0fd4157d319852782522a5a635c11ff06f49f7496cc879c853ad90d605f2
SHA51247679740d5305d6980a54ddd6fcb1ec0fd1af1d38557ec1fa44facee240eade70561385d10cc4f5d243057221d726e4635519bf50fc72c3e1cd57de0d9a644ab
-
Filesize
1KB
MD5e2d76e8f54b4f3ab8638ba0d1307d7d6
SHA19914314b13ec5eb97ed01d3a704d7ba00b6c9de8
SHA2563b6e61358d158dcb60517284936d34ccc6ec8b70d8c827479693b809c0fc7ecf
SHA512321566f96068db922ac4b5c009115499573258e5d239a8d39017a8293a0886e498aed98c6d9429da8d948745d4d494e1e03f055a33eb0a9d0eaed36cccc4cb2d
-
Filesize
5KB
MD561185b0f6b8a1222f945e5bf9748714d
SHA13d1337906a1b57faade4e4c3f718c90d19f94286
SHA25612f91a00ad8d64312dad289f299742cb5e2d5f6c39d71e53683aa42d3880d099
SHA5127293500b485e2a384d49088a513327b855a9074c06f29f8f2ea2b3b6b8625102baa2026608c453786206ce463687827c47b6668f92c9a21be0ed93cf5980403c
-
Filesize
6KB
MD57d37993c0fadab3ce40e60c0d6a3b3ff
SHA1052aab28b979104c962df49c9706eca86c9197f9
SHA256e94e1301c7995c61e65a5709ef4a0359a4c92f912b3b344d70e925bcab149b42
SHA51205125580c3485624fd90f26da67dfd87ee85cb26628f0cb90d04b15bfdff51582222dc3c0a20dec9a5178c92cd1024fa0a6ec4fef544ce8346a02ac8e82ea180
-
Filesize
7KB
MD522d9ca08f44d2753e350a1fdf13c6d41
SHA15687254928309f56c80b157e60fd554c5f9a39a7
SHA25669fa60dba71b4072445fb4f517bea4f48608f2294f695d35e172dd1adf83380b
SHA51214d79270b419d09fe977ea4a701714cba62b35776ac550d9872d08034852bd6219763373f1fc67e9c86b68b20be9d8abb56f58db42ddccca53dbd30a77c8cf49
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e11b2c2c1f4cc3f5a309e1af8b23183d
SHA1c76b627018b51c1e58bfc8e595dea14e3dd243ea
SHA25630362ebe03c9f2f41af17cf5e03b54128c70932ce30af386e9675610bde79193
SHA512ac050885f02efbdc26c665a0a62c6cfc8e5486af42481e9b0046544e21c391a76a8239f93cbcc6a10ae2e2e744b15f663573524a079c324538ca9a5ce8fadc87