Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
eac183a87c0acffbf27d7d7d58e992b6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac183a87c0acffbf27d7d7d58e992b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac183a87c0acffbf27d7d7d58e992b6_JaffaCakes118.html
-
Size
95KB
-
MD5
eac183a87c0acffbf27d7d7d58e992b6
-
SHA1
b22f32e4a7e3469329eac2e3dad99f66a25bff02
-
SHA256
80f5eb0a5279a87ec1f5342b8e6028af69f061a22fddce29102f72a4dd2d7836
-
SHA512
0e2447818b73e3bff19c7260d3397bfafb1f4fcc75864f1ffbf489dec617c92fefb97dd2af530d30da54f072bc32127895afb37d1bc761604ce7dd97e5afc828
-
SSDEEP
1536:Z9oSIRTEwj4BSja1iL5Wo06mF/+Ym2QQmXMZVINQ/h3hsw2oIAG:XoSIRTEwj4Z8wo05/XQQmuVIG/NhswBu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 1876 msedge.exe 1876 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2840 identity_helper.exe 2840 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1048 1876 msedge.exe 82 PID 1876 wrote to memory of 1048 1876 msedge.exe 82 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 3208 1876 msedge.exe 83 PID 1876 wrote to memory of 4844 1876 msedge.exe 84 PID 1876 wrote to memory of 4844 1876 msedge.exe 84 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85 PID 1876 wrote to memory of 544 1876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac183a87c0acffbf27d7d7d58e992b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd50e46f8,0x7fffd50e4708,0x7fffd50e47182⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2548 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2532 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6306670743308631242,10883029064019938966,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:2880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
547B
MD54768d1771fc72439f5e61a47524c9f8e
SHA17c3d1e254b46716934771d0484ddaef7bfdc70db
SHA2569d58b6f0d6d56c1d52ebee01b05f1daca3681d390980de57f128a290d1af14a4
SHA512e84cbbcf3f30cfef21a512d2cf45ae128097739e016f204bd4d5b260e009794046b622df63437bd659840c639b211f7ab7b22bda8f10f822098ad7ab75c25bc0
-
Filesize
5KB
MD5c143702f72b2264b79c7cb86a7c08fba
SHA12c36da64e27e85f7b05e7a9d34f3a17f17796f79
SHA256aa9c8773b4ae6edd01f6f42100c27d4cca6fc25013ed294fb16382a08c9da47a
SHA512438ae1456a4fe5a49c237aa56e03878e68c8a97f8265e902def49f13cd375329dd9dc61a00f7efb763a3218c5bbba210b2515ff8cf2c20c8fb725fbbd1f30b04
-
Filesize
6KB
MD571321941b798ebf1580aedbe19d98ab8
SHA13ef69bf4d04ba656ca935f97625e12bc4bc40dee
SHA25628d0d6dd5dde37c74503ae045baa3484c0ef7c88317149f745f69b6cc757b37a
SHA512ffd078d7cb44c698e0d771fcd40f020927c75ed5e74680e3823e47f2fc45b6f14ade407d1dd176562b5e721c9d42d5652cfd0b5ce381b359281a87a9585eca61
-
Filesize
6KB
MD5fc661188fe57495c3feef3c67d528588
SHA131597d1534fe7b12d5cd06481a3d82b25fdea37b
SHA256093dc705910352b92e5dc5a3c0003f613f47b5d73dd4ba1682aef9d93eae6d48
SHA512f03b613761bbf2e2c9b8f4ee1723b19433486cbc8dd25b2a00e3054aefe7c552984fe04be2c71bcd7cc8abe2e121507318824e21ed8407e76d385253edb801f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582537a29ea3e9fb01098ebd067ab4cd9
SHA1b07a0621b06ffe130c034e2c367c52f76aa62e90
SHA2561324cc4ebc09eddf9f89b6799b72ac1319c5c358f1ef5ea30100fcb701d3bce0
SHA512b372fb14aa343ec53adbd91d820513af3a7a1536baf5c77c3c5e7742cf71ed3df379a557a49a001d8e0e2aad1ce532546c0fc127fa75b4c2416fa2e2c3cd8991