Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html
-
Size
32KB
-
MD5
eab9b70b89430aec7012a37d8a1c7cf1
-
SHA1
e3cffe5a8fa03610b54f2e3275833a54c0f87a8c
-
SHA256
e2b53d8edb615548c36f32b7fcc6b221a8f8c43879d83f8332800713595be3ca
-
SHA512
9201f0173c65885adcec879a6b9190b5a605498e93a213aedba4a4458f9b3315a93cd5f7d13f4eb2462cefb15678e2e3b83ec287fd7960544c6943ea00d8eeca
-
SSDEEP
768:djhLDJOHE4qEEwu7PId8ZAtDqCQl1EzGEe9z0K5A8U/OHwQBYvK55+ViCpub2wVN:djhLDJOHE4qEEwu7mqAtGnrEzGEe9z04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 3260 msedge.exe 3260 msedge.exe 1396 identity_helper.exe 1396 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4808 3260 msedge.exe 84 PID 3260 wrote to memory of 4808 3260 msedge.exe 84 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2892 3260 msedge.exe 85 PID 3260 wrote to memory of 2556 3260 msedge.exe 86 PID 3260 wrote to memory of 2556 3260 msedge.exe 86 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87 PID 3260 wrote to memory of 5116 3260 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab9b70b89430aec7012a37d8a1c7cf1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8293946f8,0x7ff829394708,0x7ff8293947182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10595750062763900844,1274587056393082122,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
309B
MD5456f3f9cdae9366432509e48e7cb7444
SHA13c22757b19963c2d2c185e68a8d8386cb9d5c3d4
SHA256ebe4615db4dbcbae9dfd17990909f8e4323706712009ec33976fa7c0d5f2a57d
SHA5122803cc57825bc0e5af6bed3a907db907f9d2464a7f43e671cf33da5bda78a6e323cb9d02bc4f1738d05614c42f4b0c291f9e3dd727d2f81470135f0763eaa95e
-
Filesize
5KB
MD57123c10f9c3d721ca7089a2918693fcd
SHA10e798df2acdb323e5b49794e4815b5130e95e1e7
SHA256e959ca1753740f706548d9a01b7ae7f44209594073dd420ddec73662c41dcc90
SHA512668b4e8a3e5d35eb771dd76da7d975e6f2f4606a910d18fb71c10b264c45cf1c230c4f8d403a32abcbd75988235215d45994c10b46ec6a7084a1ccd6576340e4
-
Filesize
6KB
MD5320ae97acadc612cf86e286d29be1bd3
SHA1de865eb6aec438287cfc27d61d493eb3245ea2dd
SHA256dbae32f0da0eeabe1c4e1c7067f899c9599036de4495d66f901b441e1e170729
SHA512ac1157594cbf4c17f9d13afbb34eca0f7c2f8b03038f761c73ee52a13b4297c3eb0437c1d27eedcea3960204861dc188a5857cc7eb98d712ae21bbdd836e7eb9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5467de6501a8c21d375c82478bdac306a
SHA19fc78d271ac9348b227cb7d5edd762941da657da
SHA256e46f736550c567274b6f98918c2f0387c993942c443cd674ffb21ce0f1ab0589
SHA51205bc7ef6ba9b76585bf080928293636a3d0c4dcb2428ef796b6b21290f65cc76b65357e9d5de102ee90c7159c341ee7779f61169e94da5824bd727dbc73a676d