Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
eab0022828ed6ae2539c2d30dfc9add9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab0022828ed6ae2539c2d30dfc9add9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab0022828ed6ae2539c2d30dfc9add9_JaffaCakes118.html
-
Size
20KB
-
MD5
eab0022828ed6ae2539c2d30dfc9add9
-
SHA1
e2598d05219ae66ffe38807cee8c04f108b97882
-
SHA256
da5b2b35bd4d977c71e2394f72cc2253d17e181669a684a32ecf136354b8e99b
-
SHA512
90becb7388eb56e1f6ee44227237784dc0134512876712de5e24167a5fd70f55878a1e9bf3a3690809188751f522eada6e7ae06d7ea9e441df752430d4304fa5
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIu44zUnjBhku82qDB8:SIMd0I5nvH3svkdxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 1416 msedge.exe 1416 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 4360 1416 msedge.exe 82 PID 1416 wrote to memory of 4360 1416 msedge.exe 82 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 5032 1416 msedge.exe 83 PID 1416 wrote to memory of 4916 1416 msedge.exe 84 PID 1416 wrote to memory of 4916 1416 msedge.exe 84 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85 PID 1416 wrote to memory of 1436 1416 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab0022828ed6ae2539c2d30dfc9add9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb757a46f8,0x7ffb757a4708,0x7ffb757a47182⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,3652425876450003130,8520635829490187953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,3652425876450003130,8520635829490187953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,3652425876450003130,8520635829490187953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3652425876450003130,8520635829490187953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3652425876450003130,8520635829490187953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,3652425876450003130,8520635829490187953,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5b332332d47e1362e876e70afe5c70d8c
SHA16e93501a51625f5ab56b97805c9fc8eb45b201bd
SHA25668cb5f27748f54d0a1f4dbed16dba4c8427720fed96d0dcf334739224d15fea5
SHA5126325ada4bb1e11c780eb878c517056322a926ced7af374fd1a664971cac82858928cd35f7716ebe5a71a5d6d6a76fad11df6b3cca30f3acf86f13a13b5b14fd2
-
Filesize
6KB
MD52e1f44ff23e1b76778067809c05880a2
SHA15f211a7ba9b95815d18a1e1867ca5e3c557fe25c
SHA256338c1414f9db3de8c2e15d4e6bcf6d7cd337c13a339d94082bc43cf26fcb0702
SHA5122f917c587fb0f65e4c0d90a9aa885c3bcbbc4e940b4e880c033a5bfd90b44c5344d343204ded76267e3905f8993cb530528741236cd28ceba735fe4cebbcec93
-
Filesize
6KB
MD567c68d3bf4d489e097b5f7619812ffa9
SHA15cae94881941ac4508ac5645213e4abdb773672a
SHA256b0f0fcc85f6fe688ea28b0fd8235b86447bf7107f116bbd973e354a328f40255
SHA5126b67e8c1715fffb85706de9024478c8fe027a722bb555ade1b78c6f7b7c49294ff8fbfb09407968086bac64bf3ba2cf856b27fbc173522b4adc19e9bc5c08fd1
-
Filesize
10KB
MD5cb7d191b22c1e85a587575626c3913b5
SHA12d5817ac065744f884fa2f3736b288ca3a2a93b6
SHA256578ca66e27f29868430028785c8ca87ea4e26e350bc64ba7ede76eef547f20c9
SHA51205cb6581ea8520fa56c7b1e682c947c0503857956ff093d69e0d862b6d5dc83b76d840749e902aab1768a5dfc9f0108b88ead3afa649afba0850c7f93022cbfb