Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
eaba77f96700f7177b931c1013855c33_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaba77f96700f7177b931c1013855c33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaba77f96700f7177b931c1013855c33_JaffaCakes118.html
-
Size
40KB
-
MD5
eaba77f96700f7177b931c1013855c33
-
SHA1
58c359f56c868b1f7b6af4914316ddeca528dbe8
-
SHA256
c3af4c02e66adb4db0076c247a25901a6221d8579515f0d8ef09c6e79ce1e908
-
SHA512
bc7788ab8c744ddf9fd5c98b373816bf6ff671ed7117dfcd2c727c12192c31f10c2320e4421aef1ff2b8663d3cfa82fba63df51c82a8a29ff0a5f059daa739d1
-
SSDEEP
768:M/lWmkjIeCkCVCvCvCPCPCCCCCyCyCpCpC1C1C1C1C1C1CBT8Jh+2zJfyLAJpy/s:M/lWvjIeBEwwaaFFPPwwmmmmmmaT8JhR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 724 msedge.exe 724 msedge.exe 1828 identity_helper.exe 1828 identity_helper.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 724 wrote to memory of 4292 724 msedge.exe 82 PID 724 wrote to memory of 4292 724 msedge.exe 82 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 4300 724 msedge.exe 83 PID 724 wrote to memory of 3360 724 msedge.exe 84 PID 724 wrote to memory of 3360 724 msedge.exe 84 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85 PID 724 wrote to memory of 1980 724 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaba77f96700f7177b931c1013855c33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed34f46f8,0x7ffed34f4708,0x7ffed34f47182⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6661692563790003466,11949898056132427314,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c2839bc2e2051fedae0325417af836e7
SHA19ae4c09a4864da35da77560ec016e42cf32a414f
SHA2564e6e3758fc8dd7591ba28f8f776779c4b2b6d5b111189387bdfd888d66c61138
SHA512fab247022ca9889ffbc5a0cc9ca226149219e2a5f2997ed901a18b89de03b9142c88db248fc2c9ba5bf117fc8b3ebdbb920e23ed7a31e4275efcb0ea7d37e6d9
-
Filesize
921B
MD543f3f3fe2e524dc55938d3bcc8cbc38d
SHA1a677ae884a3e4f6e3ef41e69eaf3b7f10dd82a61
SHA2564a4d5f5cffa15ce1813c942c171e9199a08093a29cac76d4c45743bd4aaaada0
SHA512a1e74ec294656e6548a1598f37b99eac1a5eefd13717644a24a3f54f5a31026aca3c6e95b1f42df3c6a714996abab66f99765cd47e38638e48a9fdd2394a0221
-
Filesize
5KB
MD5838aaa336c6943003231ed1d5a15ec78
SHA1755584120d39d20bb3e8f5be453234315848349b
SHA256a55085ad7c4c4845093160fc7ab2a8f953236a0e8d969bfcc50490f86ddfa7e5
SHA5120677e6be2818507456d7a237eaadd38279f47d1a9252bd6af82f2fd43b361e15e04c5618065c650a4227acb92c6c51575722c74a18205b8ea00c95669dd93ec2
-
Filesize
6KB
MD5a02e5904745bbbdb7cacab1d191c87c7
SHA1f383dce0cdcb41620168dba69850fd7e63cdf39f
SHA2567c80adc0ae4c1e2f8742cc7b4657f58dc927be3f34ece05349808f6d7d3edc58
SHA51203250ac4eff39481f1398f8ea50768fe1082a172f2c4ef6c5be906e0ff34aafcef935433cd1216f6a556efab3600e9ba355b508f9bfb882da30caa74dbd7ad45
-
Filesize
6KB
MD5417a5a9cc27d2cc52c84e26c9dcee5f1
SHA1dac9f4549133d4e547f0ae81dded74e7f4af392c
SHA25626d5c04aaebb39e724e0d6509fd1634752b9a5f40bbee2d6e901be98c8aa178f
SHA512e42fd5af60d6de420ac1197d4aa9cc3c36a58ea8a579f5362f61f7aebbe7f03f11a5a2f1d58074c8710b8762bbbede7a1f84a0b4e17848715a2431d12ddb2fb6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50efbf4900de20168ddd730d8ffae1bdf
SHA1aec0072442aefee9954974a6e5f0f70d5b4ab8e8
SHA256bd40ac4b6f83246ec249e74d53efb6a22a4076e2cb4bf6b265c1f2b9fac72ab4
SHA5122a925cce5ff6e5e2b54755c27a6bafd3f10857a4fa9cdceab2e78eb4ae2f106c80c76a69498dd5922d69cc7f767f85d426436379fd74e570e71dd88a1a96447b