Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
eab1cf3e46dfea33a13dce890dbe32b9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab1cf3e46dfea33a13dce890dbe32b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab1cf3e46dfea33a13dce890dbe32b9_JaffaCakes118.html
-
Size
11KB
-
MD5
eab1cf3e46dfea33a13dce890dbe32b9
-
SHA1
d25dd1bbb7fe529394a508206894d45ec9d45824
-
SHA256
042277cae025d9374609a0d8f2df2af66d0996e3304bd66b1dcf649806bcbdfb
-
SHA512
a20b42ad1d4c6870cee8bc4c1380fcbf87631ad872184647db7098eb12bf455ffce9ca85a20b4480087ab9f11e756727f0b001c2d29a88dbab3ec4691dbfc52c
-
SSDEEP
192:r2LS2Lv2tvYP2LHR1LfP6wgN4EJ6+6vOyQTF2JN0o:r2e2DqvYP211LfP6wgRF2jv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 3104 msedge.exe 3104 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 3884 3104 msedge.exe 84 PID 3104 wrote to memory of 3884 3104 msedge.exe 84 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 632 3104 msedge.exe 85 PID 3104 wrote to memory of 4780 3104 msedge.exe 86 PID 3104 wrote to memory of 4780 3104 msedge.exe 86 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87 PID 3104 wrote to memory of 2792 3104 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab1cf3e46dfea33a13dce890dbe32b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9afe246f8,0x7ff9afe24708,0x7ff9afe247182⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7509928557487998377,11861970499517841926,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5c7789cc19e06d81bc7e702a505c57f77
SHA1c8f125b1148d2a60062efa4e3e3851b7fbc44374
SHA2564d8278fccba5d3ce859383062d6b67f7d831d7ade46b9c98fcb8dd7148a9e4d4
SHA512e49182831dc459784c2a98a8b876e22ff194f84d023745d1951194404e8e2fd0eccf500305d4c2109304e93730ce03e16d33e5c556d6144890d166727abf4a6e
-
Filesize
6KB
MD5837755c09f1ff167765d157fef2a84f5
SHA118ff08540928e0fc57f7376ca49c4d26fc8f8499
SHA2563d075694acd4381c8d365a24bb79260f3b0a4ba58a26716b8b1d44d4ead4fe18
SHA5121c8f2cd8593cd009b9a8f2e861d8cf4549b6de7c4700e9e389116482a021d22d05d0d7a43164b7bb6331eed2612ab0c9748ded3bf152475bdadf383854c8b928
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD593d16ed5b537ac97907b06b06dc9fcb2
SHA136404c8a5456e56b999466c8360070dfc288c4fd
SHA256641d01e7462cc95bbcef64f3dec23821676df711774f6d45b9bb2471fd1f5d6f
SHA51294dc9353179a3b642ca769c855ccce0ec2829d15b52a7e765fbb029855ecbfb282fab6670e739805d552003bb7add24de4c2894a708aa37257f9c3cfe3a6e08f