Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
eab0b9c73a7bec324c7288ff85c69ebb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab0b9c73a7bec324c7288ff85c69ebb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab0b9c73a7bec324c7288ff85c69ebb_JaffaCakes118.html
-
Size
33KB
-
MD5
eab0b9c73a7bec324c7288ff85c69ebb
-
SHA1
70bc678f48dec6343c82f39e7ad7908ad2bd0afe
-
SHA256
8822a3fbfc3f3e951c66e8a7fb701560f0fb3e9864515ac1492737dbd7fcb6d2
-
SHA512
c00406aed63e21a126100828d51b170ecbbede2e9f9666c8e4da56b64e0b70c2cd230bcc99d68fa4f8816571aaec0c3f979da4b19825dfedbb6a8a1d94255484
-
SSDEEP
192:uWX2fb5n6RnQjxn5Q/JnQiesNnGnQOkEnt77nQTbnxnQqMCKAPkrb2nxvFtmeC+D:2Q/d4VgxvFwcVC4kFZUUoMKOy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4524 msedge.exe 4524 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4972 4524 msedge.exe 85 PID 4524 wrote to memory of 4972 4524 msedge.exe 85 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 1936 4524 msedge.exe 86 PID 4524 wrote to memory of 4960 4524 msedge.exe 87 PID 4524 wrote to memory of 4960 4524 msedge.exe 87 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88 PID 4524 wrote to memory of 408 4524 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab0b9c73a7bec324c7288ff85c69ebb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb979446f8,0x7ffb97944708,0x7ffb979447182⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10903695517778918020,5221584510814350005,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5c15e26816a6000cf56ffdac2b24d6798
SHA101a2ac830e23dec5f77b9d6fd8bba45646f27d68
SHA256483818caaf454189b90b42138be4038061ea85e7f21a25e3851ea5c7457690ca
SHA51218056a2529c37af09d3a28df04c4c26eb3fe7a4aedaab6bf432cfba93d7852cd0f7cb58f16f846c47c9ef088c18ea6fe1b8c62442677edc85e058661606f2dd6
-
Filesize
6KB
MD567fb79d459c652f8965324e52e64ecce
SHA11f5bd8d6119a2e196a1b40f4f7c8f4145a3c7749
SHA2566c93825e2ef28dc23f4151142d598047fc9329473ada9acdd407416b9022f6e3
SHA512db8d13c530481492c2a1b66c22f260118b8e23d702ed4c5907259f07e69d87eaa83250b1f07f9dcf910988de77e60bcdf65852b12c2ba954fcea3303a32b3ed3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5985b691f5b323c78d71ad450e7cbb616
SHA112e76518d6024c7cfbe2bbc9a067e95496558ee3
SHA2560c55ca22e549ada33b5ff64ce5ab8eade18c880f2f0eda6e6f732ea36eacf183
SHA512bd73a1e36e97aa1b7146f61d22c25babe115bfbc5d8c15620ac5c4b05a46dd738b12029509d11f3a632184fe7165ab42e2452549a0f694186d9ec786195ca5be