Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
eab63c72377a2d40a78decee0c23fe16_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab63c72377a2d40a78decee0c23fe16_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab63c72377a2d40a78decee0c23fe16_JaffaCakes118.html
-
Size
90B
-
MD5
eab63c72377a2d40a78decee0c23fe16
-
SHA1
3e5a749f8424a2bc2886860da879f57acd510905
-
SHA256
1bd73992f55fd2645784b12413a7dee11223f0be366e065920145af8269ed3ab
-
SHA512
c5336fc2c7980cb2aaff86b76d328f52bb09b644c45c37d8158c54f4199529f60447fe6acda1070831c72012cd2da84d5597c0a319af90f34619c603befa2d79
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 2204 msedge.exe 2204 msedge.exe 4064 identity_helper.exe 4064 identity_helper.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3616 2204 msedge.exe 82 PID 2204 wrote to memory of 3616 2204 msedge.exe 82 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 2644 2204 msedge.exe 83 PID 2204 wrote to memory of 4396 2204 msedge.exe 84 PID 2204 wrote to memory of 4396 2204 msedge.exe 84 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85 PID 2204 wrote to memory of 4480 2204 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab63c72377a2d40a78decee0c23fe16_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebc3c46f8,0x7ffebc3c4708,0x7ffebc3c47182⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2772 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6126015405536000514,9056454746170339581,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5a51a252a9c4407335a1d6f33b52215bb
SHA1c13069490b25d72a6feb8f19bb52280d386b1aee
SHA2566e88e2bb3ed5a0a29830569a7521ad7365165494cdf85d90f21d62034318c0b3
SHA51219fff32cb40b463473e1e3cefad05bc8b1e9b5a0cd3e7a3e100722fd7fe5ef1d045e30312d9cf810e8196bb53362afbf1656d9dcb806837e2766b060e94facd3
-
Filesize
6KB
MD50cb91f0f06c70229dd260093537b6ef4
SHA16c75afce957b707920adf2bd04618852d6cb9511
SHA256485f0b721b753f09f2c4c93b7f34b8905f48af66a40406907f96f4fe058d67f5
SHA5122f5319ef726543648987b459788f98794c489137187e7f2ce7e7b3458b16a6c50dd87978003fcdc66ea39eb9fba932b50507ac3361a1cf1293e75d10ac7ccfaa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD535444a4d51657f1fe02db1e500a6c4cd
SHA166d0ef0f46598a3c30a49746a379f70a9b781abe
SHA256872c0a64d30fd7906d885dc1393d7aa29c500f1877015695ad1fb7d3cda22ab2
SHA51254693498100406be659062a289dd2c02cff6759fffececea4e8f28abf8f4d784ccd55e5340dc3e4d17440a38f38749848f961c08def6b42f235eac1a77276593