Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
eac238515ecdc1ba364c83a83df01986_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac238515ecdc1ba364c83a83df01986_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac238515ecdc1ba364c83a83df01986_JaffaCakes118.html
-
Size
53KB
-
MD5
eac238515ecdc1ba364c83a83df01986
-
SHA1
da2b48635dfe75e6df9aa67755acf4e803152961
-
SHA256
13ce9ffa601f8f24d70f324e27063e4fa7673ba3da9e7c934fada6d4934de395
-
SHA512
9144d018e95fce7c11a03ced775985801124317960fcbfdb7a740a8b54e9ffca54af51515dddc4e58d4bf0fe057e1404c070bf99871dd0cb96b90784d97af94f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlYL63Nj+q5Vy0R0w2AzTICbbzoA/t9M/dNwIUTDmDT:CkgUiIakTqGivi+PyUMrunlYL63Nj+q0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3316 msedge.exe 3316 msedge.exe 4596 identity_helper.exe 4596 identity_helper.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 5060 3316 msedge.exe 84 PID 3316 wrote to memory of 5060 3316 msedge.exe 84 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 4004 3316 msedge.exe 85 PID 3316 wrote to memory of 3680 3316 msedge.exe 86 PID 3316 wrote to memory of 3680 3316 msedge.exe 86 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87 PID 3316 wrote to memory of 4920 3316 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac238515ecdc1ba364c83a83df01986_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7d4a46f8,0x7ffe7d4a4708,0x7ffe7d4a47182⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18054317278927334409,8174823885148680100,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD51465379811e080230fd1a179efa4c64f
SHA19b107cc2bddb46cabd4afc167e71221eed047180
SHA256634b128abc8ad37b679ede295252838c13f6e1a661cb258668b02110436ae48c
SHA512f6c217e4c91dcb3960948465e13989b1bf39701113f909cee4bf4f09a779089575c681e6f786f9ef31b417d5ecb4f67dc013c4d04cd24cddcfa9086063b56f39
-
Filesize
6KB
MD5be8dbdbb3fb6c96cf4b3ca18605f9f8b
SHA1eb6efd94836ebd68de75848fbb388d0487807a65
SHA25692f5f02a12125db78be29f931074eb1870a83cb367c6df401a8a6c47229cc3ca
SHA512e32385ae61a63aebfb9ed8700a72daabed540088db11cb6dc1b6fa5878d03c392691d84e6c9d81d083a29682a89f10e3061021a6bb94a5b540d7e2120e24402a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a3e13939390ae0776ba6a4d3235828e8
SHA1a3928b0c52bf4916b263dfae46db4ab3c563e348
SHA256b04c2b275a1533a87eb4f615c5adc9dfbeae0543301f1a7b1995f33b488451b7
SHA512dec18f2676f5093af58e58ab828e3e17512183b622f6a772fac8ff28027da9d3e5634a5ba9257b67899093923fd12c17a29ddcb96fe60ed82ca8ba0865355f0c