Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
eab48cee285589237fe097674cffa82e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab48cee285589237fe097674cffa82e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab48cee285589237fe097674cffa82e_JaffaCakes118.html
-
Size
517KB
-
MD5
eab48cee285589237fe097674cffa82e
-
SHA1
3a9e641a653533a8d22fe8aef9a0ad24e8220108
-
SHA256
4870b4d3b629ac43de41105775e68ec1bf4744b75487489cf6bee5fe8d44462c
-
SHA512
e87e5913513c0588a3f9caf443d313576cadea0c47dab1447737f2d5a8a88549e7bd2839f749e8e67bdce6d1c5ae314dc419f49fa2e9da244a835aee3f9da5fc
-
SSDEEP
3072:wT+IpBxYUVuO9zfs49IwVeL5AmPTmBcM2mqI12:wT+IpBxMl4ULT3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2700 msedge.exe 2700 msedge.exe 1280 identity_helper.exe 1280 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2288 2700 msedge.exe 82 PID 2700 wrote to memory of 2288 2700 msedge.exe 82 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 5032 2700 msedge.exe 83 PID 2700 wrote to memory of 2244 2700 msedge.exe 84 PID 2700 wrote to memory of 2244 2700 msedge.exe 84 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85 PID 2700 wrote to memory of 5008 2700 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab48cee285589237fe097674cffa82e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb61a646f8,0x7ffb61a64708,0x7ffb61a647182⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8109422906473025735,9895015672987946165,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD52bb1a7d6e928c5a48648c8d3c79ff6c8
SHA1eb16e44dc6197cc19c518a6b465f28d03c731d44
SHA256f44bb7cab55ad5ad4e18f764bd1bc0ec3796b6da385aaa2d9422f85413f5e256
SHA512991bb9b3a96bc40c5dac290e98e920655c15285e3669687c11ec58caa3a5914c050582ef4a29ef5992c3f9d3a571df922f172a5ec48932abc38888a6a9e4971c
-
Filesize
1KB
MD55b5b8d05b7bf55937177f9f62c5dce44
SHA18ca1d31ab09131ab8f1a4a8c8e2d4f4b5d92ec58
SHA256dc8a0f81fad0c7579910d8d415e5343c762f365601affb7a017775adc5a5bd7c
SHA5124bcd154bf9f6ae69497c1923fa3e45e71f32300c39b30a790e6e45455d2b6e54bf480ab42b852c68a2755e0abaa834767f25dc03de7b5ae1865820a0f95fdf51
-
Filesize
5KB
MD5dfb4959b616ad71566a3ad02b4aa121a
SHA1750727353927929580c311b0bfb341a44453598f
SHA2566da2ea7538d6c23b872a2577d241ce75791f647b4a2edc6a5b1557b3ac358d0b
SHA51253f4e48990071f2d88c711ed1b6c1cdbcd5545566fb5a8e4d088d2ebe9fdce35d686f7500ce2f3a4591a3069a6ecaa7d3ea5a5a26a5b459594601fdcb0f34b3b
-
Filesize
6KB
MD53b89bf4b8ac866f826c8dfc5e9852cde
SHA107e94486673cd28d7e98f531440fbf0d1cb788d2
SHA2569546895310e87a393b6b43c156bb04729ce8222416ffa8117ffe5ee0ba98c16f
SHA512390abb91ad5ba1125410f08f2fddf17ee51472e4f528af4afa6b4ab99f86e4f296f9017e045fa192bbc50707ed0773f5fd021bc5c411c7699fcd73dc1d6e2879
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c339409c-13d1-4538-8a2b-b077cc9424f8.tmp
Filesize6KB
MD549fda793c36fe7bed36438418f46c784
SHA11a8845e502a0b19a97e4e0a4741b0f1d89cd112a
SHA25627a91c17b3347ed1aa6f4adfb95378c82ea8e4f41219ce0ef12c3eb1c967877d
SHA5128f0a76f23750c25661bb51ef4ff7370b8f2da310b7687e5bba42e1a6fbd761a6251bdb8d2c7ae21f62a4077133fdb42d72b8ec9502eb26c6fa9ab369dde00fd8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbf16d67345d667592025c4581f6d482
SHA1c4a7417070b73822cc28b536d2ea82dfe36cbbc4
SHA256ddbe739bf108e782ad3d879bae443ca3635167e664a91ceeb3107ece7910ba15
SHA5122878595e2d8cb4bbfd95643528c9ba3b2c182c109c889d922f013cd7fe7ca44c2e86def06fe76cd5c5bd4660dbc12d9cbdc31b152f0f47c285fae6e90a0c682e