Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
eab98fafad22d4149a5060647206225e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab98fafad22d4149a5060647206225e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab98fafad22d4149a5060647206225e_JaffaCakes118.html
-
Size
214KB
-
MD5
eab98fafad22d4149a5060647206225e
-
SHA1
7698ca19e8ef4ddbd2ecbd8b8c0de5cde16e6ea0
-
SHA256
76efbb26fa1223bb218b5f3c11ab1c7d74be0ac23b501386d0b0d86bc6635428
-
SHA512
e0a295b0b1ca89ca2d94b6ef981a9ee1da6616b4b21d4087a5a5d5131256dbe45cfcef8ec941e0ed0639c623223f0a1c01c9a4e8634c713334f85c6464535ec9
-
SSDEEP
3072:lrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ6:5z9VxLY7iAVLTBQJl6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1900 msedge.exe 1900 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4964 1900 msedge.exe 82 PID 1900 wrote to memory of 4964 1900 msedge.exe 82 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 3132 1900 msedge.exe 83 PID 1900 wrote to memory of 1868 1900 msedge.exe 84 PID 1900 wrote to memory of 1868 1900 msedge.exe 84 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85 PID 1900 wrote to memory of 2576 1900 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab98fafad22d4149a5060647206225e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdffd46f8,0x7ffbdffd4708,0x7ffbdffd47182⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8555798120979383718,6532406241840646434,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8555798120979383718,6532406241840646434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8555798120979383718,6532406241840646434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8555798120979383718,6532406241840646434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8555798120979383718,6532406241840646434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8555798120979383718,6532406241840646434,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5e12280bae97e026760a1d5408a6ad0e1
SHA1c19dc4cff9e5a00ff0a69d0dc59e12712454a728
SHA2560356e542a0bd661d1d785a4ad142589967265cbb111f460aa20961796f5f89fe
SHA5124130b181bc5f9319f5367a93a2c3524443c31ebdaeaa35aae1c43b80282d2bf1a8e9592093d6456794401ff939580ba9720423b6c7ffa61fbd113271098ada77
-
Filesize
6KB
MD5dd32f7db15aa45a7862b4e958ee05b16
SHA1a0fee67b29cecfcdb776448045898f27e56ebc4f
SHA256da16fde5100361f0aa3dfbb01b4ddebc62f5d797ced5d4e25106dd6bcfae71a6
SHA51262413353baf6f79a8d62f467e59efbcd72be1cb1b0373dabe74c7f00cc5ad6cc2d9ec8bbf6528f318f08b0673ab59f6b3a2ca18ec755e4ef68727b874efa24cd
-
Filesize
6KB
MD5d2781675eecef2cb988c46d6467cc8f8
SHA1f9dda5c938b49e51bcc757ebd45ed0c8f2f16d36
SHA25620ce097ea5a5597c846a3fd15522543ed9283c9f47d25000e9bff98940bc3e56
SHA5121c966899b7fcf227dcf709faa65522b405a31aed2877c8da41f0d9a5a6958fc271028204226d186a04cc6dc70147223f9c640bd93902c40c2e1efda1236c84c3
-
Filesize
10KB
MD5e3065a5122f37417e65fa6f912497b57
SHA177755f9d51911c3cdfa27fdb23c7b3c5612c7d9d
SHA256eb5deb5bf1f05a1a1d57e56671d50ff2efcc400cd493e3c8dace22e248570a3c
SHA512708e9a831b910ef3fd2a856522525cfa7b30397df91b7bfb59557dc00cae8d4a4746ac36ccbbd40068eefc46a3427225ed26fbcdb6b71b8fb3595359aef4182d