Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html
-
Size
6KB
-
MD5
eabb1ea476be37a3ce5d62fafb66f3dd
-
SHA1
0e0370794103d4bbc879313ccaa1db6a6a408f8c
-
SHA256
182b19bdfa39e89e9b2fccbe2383f4950b130fb81fbcca8980eb18408d4a6669
-
SHA512
f99adda54163f470f62601b1e0b91ca378e64ee8ef893c52ca60652b8062750d0579441e57c2e948c088882069e664dcdd58d85a6f51faed073a37a54db38848
-
SSDEEP
96:uzVs+ux7XgLLY1k9o84d12ef7CSTUEl/6/NcEZ7ru7f:csz7XgAYS/b4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 2188 msedge.exe 2188 msedge.exe 264 identity_helper.exe 264 identity_helper.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2688 2188 msedge.exe 82 PID 2188 wrote to memory of 2688 2188 msedge.exe 82 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 4852 2188 msedge.exe 83 PID 2188 wrote to memory of 3124 2188 msedge.exe 84 PID 2188 wrote to memory of 3124 2188 msedge.exe 84 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85 PID 2188 wrote to memory of 628 2188 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81a2946f8,0x7ff81a294708,0x7ff81a2947182⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7082467872092540843,12644739915709149400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
6KB
MD54f9a0d06798a32d251a55a55eb722fb2
SHA11e542c225438de81c39d526c0f1631c303295773
SHA256fa44026d1cb20dba35a00b6d1dd098e1ee465b19dfce375b01252cf77b821276
SHA512ff2c48d7a06b8722ce5658dafe83a78aeaecc4cc171cfdbb85305241299ebe766b1d580f68e76f82a1b9664df61465facf56386559c5a45dfa8b821051d547b6
-
Filesize
5KB
MD5af5ecea7e6fb32bf566f94b0d93bef01
SHA1f60bf17b25040e4a98a10ec38216c17fdd6cba4c
SHA256800c6dfff6c097192ca46890842233a32d9b89791e2385fa004bb1ab3abe8ef5
SHA5122dea0d7fe5e4e7b799dc404348a22036f7f6dbf91b2b2e6f3d37e473c3ed594fc6df104b5fe833099131b49e43758e5a8cde3c47da357d985906d30e3df26d79
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5175bd81bc0bae81b42e5f9fc75009478
SHA1c1eb83468acb9194b4c0ba856edf649f65569ef4
SHA25652c615159158a7a33c8e0d360fe229c374c63428aaea5ed0746918a0975c05e5
SHA512a6607237617919c2728c44e6d7879aae8acc6c16fa86485dde0ef93e0aadbeb211b72e89b750fc79a10433c3a64255505441bddc4df9174c93545c56d264d2e1