Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
eabb3259cacf3e3487f8a0d90ac030e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabb3259cacf3e3487f8a0d90ac030e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabb3259cacf3e3487f8a0d90ac030e9_JaffaCakes118.html
-
Size
30KB
-
MD5
eabb3259cacf3e3487f8a0d90ac030e9
-
SHA1
4d28e7b2dd165e6b26c0385aab6b6d35c8070cab
-
SHA256
f738d32c35756041c2f6fa0987add90d44a61fd0063c6c5e666329ad99a33feb
-
SHA512
98a299a9e4ecfcd07cb4e9e3e9d3b34100038e63ba625b6039c1a5084997d69f575cc0d7de60c2baeb4cab255a574ad2071b4d0944f8ba6a7b4245ea779e548c
-
SSDEEP
192:uWT5b5nn3nQjxn5Q/GnQiedNn7nQOkEntKMnQTbn1nQuMCNAU6K+iibI3serwxwH:QQ/8ThOcca5zARvfCO6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 772 msedge.exe 772 msedge.exe 536 msedge.exe 536 msedge.exe 3948 identity_helper.exe 3948 identity_helper.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 1796 536 msedge.exe 82 PID 536 wrote to memory of 1796 536 msedge.exe 82 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 2144 536 msedge.exe 83 PID 536 wrote to memory of 772 536 msedge.exe 84 PID 536 wrote to memory of 772 536 msedge.exe 84 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85 PID 536 wrote to memory of 4428 536 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabb3259cacf3e3487f8a0d90ac030e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e8a146f8,0x7ff8e8a14708,0x7ff8e8a147182⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3665625617589537382,15442273548894904689,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\897bd466-77ed-4ed1-ae6f-d05eadb1278d.tmp
Filesize5KB
MD5bdbc29886b5fbd15325bbf52c362a452
SHA1c11c0410bc69d76648ed94faf23a6cf5c80aca8d
SHA256bf163cb1f9f0becbc238ee65e31cde2286193be70915a600b7052cbdf9968e22
SHA5124125a9967b20508a7334733023c03a1955ca846eefa8475b8129985d92114c0242c5981b8a54fa73e461ee9310cd746efa98ee1dff934a275c606133ab19842d
-
Filesize
6KB
MD50a0d7cdb689e0bf1e796b18431f7deaf
SHA1cd5f706bac6ae7ae9e8efb40abe13dad26be4384
SHA256845e20d20ddbd23f0f96dd4d617c53d17cdbb1bf045069d85c9b8789e613f9e5
SHA5124954fae4bdf5f05eb70c7cf3675b2033931a8b4e9230b5b4b96a85ec899c8d91cfe93204fb6245640d60d536111bc6797055fba363324ca722ba262f53ddb8c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5df07db1f8d4528757d20d9f6f2ccc3e7
SHA1345d715c77e33a5bf53fbf50a1aa9fa51932d919
SHA256b1467ac3ed90f0d59021c36bc2e342c69c87b154cacde0406ccf25ce1d4e9005
SHA512284bd4492fbd4abf2f5ee1511fea787d12bb59c94bf75f2be82397d776b9111eefa6593d566514174ace0a0229140ea7b185c2271d7099748de2bbec458ab621