Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
eac1790dc322d82ef559b52487090451_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac1790dc322d82ef559b52487090451_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac1790dc322d82ef559b52487090451_JaffaCakes118.html
-
Size
21KB
-
MD5
eac1790dc322d82ef559b52487090451
-
SHA1
fc11b6ab23c94a3759dd4ed028e1d2570be996c1
-
SHA256
ca63384bf86f3cdb1141996093099b896019626269da852fc1e2b1fe21235ac9
-
SHA512
1a9c280cc1919d1481db6d37fc58c8960ceb832e8f4cd87024a89b11575cb5971651b0be0a0fe3bb7a1b985f1cff9d47eee0fca2284aea15d0a1a75db61e553f
-
SSDEEP
384:mcGR0u+Ica1ttUKBSIkE0ShF6lRVJJ3nDql6eIF0zGWLK0:mDv+IX1ttUKBSIkE0SD6lf3Dqlyw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 636 msedge.exe 636 msedge.exe 4396 msedge.exe 4396 msedge.exe 4596 identity_helper.exe 4596 identity_helper.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 2148 4396 msedge.exe 83 PID 4396 wrote to memory of 2148 4396 msedge.exe 83 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 536 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 85 PID 4396 wrote to memory of 636 4396 msedge.exe 85 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86 PID 4396 wrote to memory of 772 4396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac1790dc322d82ef559b52487090451_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9657b46f8,0x7ff9657b4708,0x7ff9657b47182⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,2975770818171236137,1364768493733204145,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
250B
MD53e271ea6aaf5bb76936158d4745d5d8a
SHA17e698d0ef76bef3ab138a6e378d8a00256411293
SHA2567935ac040caed4d7b1a763616c1bee063fef626b9425bc7652dba1d20f0688bb
SHA5128bd86b9f5974ff8807f828e1b4fc10d30206e49888f0d6759885db87f7483a56a0456f046aefdd5a55fb6c3729ef0ba28fd910eeb2d1c7d12146d9e4ed4a0993
-
Filesize
5KB
MD545461ad0bd117171e349e214997534f9
SHA169ace329bde48b597a1f81ff0c86f7c03327df13
SHA2567ac8eba42523023db4b782e31ab1dea4abf13b9a54a5b425eadb918b8d2b4d3e
SHA51242faa940d6da7cf800c3620c780a54b2d6d330e07ec14f009a71f9ab29e2991f379128da4c8a153ad11c96f14406587ad0baf4ec6091edcd162f12e31daa258e
-
Filesize
6KB
MD5a5fa1532ea7c96354f7c38f772526ceb
SHA1900cb5a201f70b39173e55d28ba063a0fd9756cd
SHA2564ccd5e624cd70c542f188196a8b32c7cbe675d72fccd9e6a13058e25954fa669
SHA5126c6eb248e1f48cd7f1670607e6e0eea05d145e1826f022fb9b095f443da3196f60f31875a9ef348e5bf7ccd14c49adb6006d1d3f3ada0d86649bea22300d71b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5728302c2fac6c6843bc0798b6170c05c
SHA1fe773e08f7f9c27e5a1738660462f34aa86c0913
SHA2565fd557071d026b171b9c54f3b70ef6b26bcd52d09c44b6f097903572469de3ee
SHA512ef485ee72974f15c2d8d1e8ce5b63fcdcb6c70985f2f77aced40c41d5d05002332cf6819539c01d85c5da10bb4aaba2450dd5349f66989b65def137ba0337f92