Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
eab93a51f6272c48380971407d646ba5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab93a51f6272c48380971407d646ba5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab93a51f6272c48380971407d646ba5_JaffaCakes118.html
-
Size
57KB
-
MD5
eab93a51f6272c48380971407d646ba5
-
SHA1
8d616a0d48b4dff341ce1d086bcbc74f76b9b06a
-
SHA256
183a1ca21eee57fb5cd6fe0a6843610e2a8bfce938f376cda3861f06c7bfda7e
-
SHA512
c48d429147daca195c786d9f53cbfa0706f4cfef2648d653152917628dd5cdc55caff697e9a2888b4e767df1095db4e8784be390877d384383f8edc26e94da8c
-
SSDEEP
1536:ijEQvK8OPHdVAUo2vgyHJv0owbd6zKD6CDK2RVroNFwpDK2RVy:ijnOPHdVW2vgyHJutDK2RVroNFwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 528 msedge.exe 528 msedge.exe 2192 identity_helper.exe 2192 identity_helper.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 528 wrote to memory of 2916 528 msedge.exe 82 PID 528 wrote to memory of 2916 528 msedge.exe 82 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 1536 528 msedge.exe 83 PID 528 wrote to memory of 4236 528 msedge.exe 84 PID 528 wrote to memory of 4236 528 msedge.exe 84 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85 PID 528 wrote to memory of 220 528 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab93a51f6272c48380971407d646ba5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd45c46f8,0x7ffbd45c4708,0x7ffbd45c47182⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2456 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17654507403674915941,7361594014737610565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD54338870910ead13667348e16d2995453
SHA135722a9609a3fa875d155f59238134891adb8e84
SHA25671d558de16bb83646d687dc66aa10108528bb59d8f4ed55a9aac6db4c1a51861
SHA5126ad3ba5efa2545e739da7bcd338ebca1f6268719e3def181721426effa4cf6c4f429ce8ae615c975ba473173a8b7b1ad8c4d75ca5d65bbed00c27120b5ed2652
-
Filesize
2KB
MD59fea0ca8f8618d1b74863c6b45cc2048
SHA12b765a30b8e7ce0148024103678bb5fec1b2667b
SHA256f051e3174db8c2bc0020db98499b47bf86f3fbe93afec9436bf3eb0f2ad34e2f
SHA5124d340e431adbca8241ae0524891cf949ced6ae66cadb68112310059ce526619a2310678905ab2ab4f6476d322be0f7ef0530ccf7edc86151c258f4f190feedb4
-
Filesize
5KB
MD5e214797a45eb6de8c4960e465ebd40a5
SHA1bea1bfc98d4953f81a0c612e86f7eca0e4d41b9e
SHA256ae2b7b65e0b8e4e821bb371ea406ae3a60a0f84ce834850ed294325e74729fa2
SHA512e96c1fcbea2f1459f2beeefb4c5641754cbe5cb21131807f52d625d5277633003f683e3e099922b45cfe314d435df47b71417825128b1756b243db1f4ea44e4c
-
Filesize
6KB
MD50ba846b89e510f1672fa7016950e7536
SHA1c457678851914f1e81a5818a11305f35c59f45b4
SHA2564c66d1386919d7b28ca959c6cad1567bddf657ba301fd48620283e01aa190f86
SHA512affa4492292710abe08d0a0bebf9c98fb69b8ba4d1b10daad5b891d53a51ad805e43bd5bc5d1e10b4974960877a247154897be8d14ced434c6758f5152cf14a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53847f4506ca08e4a840a72561d1d0d20
SHA1589c0d6fad5f1ea414e91dc3aab19165adf50d85
SHA256df243d1a158d2b670e79c87c430974765a1777acb6628c35ded1ffc28964bd53
SHA51269c48c42b819f65d4770b8991e73fb49b871f9168906661c4235c4031a89d7032a2249175a602ad799df5fd94b20b7be3a7d2206fca9c96ed513bdc7fc324405