Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
eabba2a4ebc4df1922f603df94dc795a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabba2a4ebc4df1922f603df94dc795a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabba2a4ebc4df1922f603df94dc795a_JaffaCakes118.html
-
Size
9KB
-
MD5
eabba2a4ebc4df1922f603df94dc795a
-
SHA1
f748027802da0d38289b5f94b1b3736a040bdd30
-
SHA256
199530e2708e83ebd360d5153514c90ac06514887c9f76f285be5d2c942329bd
-
SHA512
e9589eaee8d680cd82f1b7b704bf375c1bc7e2e43c3a57fa7f3c290bc9218ccdbfd4ba034a9a18fcd694011bf038e6ac82d2c1b560a16e5d868ad7a571b6bf5d
-
SSDEEP
96:82KUt4RbR+5A+e/jftfHoJoEGH4X7b0qoIAgQzLZqiWOZqAj4RbR+25JzEGcf6TB:85UeRd++jlIpGrjzXgRd+iE7RD5NU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 2996 msedge.exe 2996 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 4976 2996 msedge.exe 82 PID 2996 wrote to memory of 4976 2996 msedge.exe 82 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 4384 2996 msedge.exe 83 PID 2996 wrote to memory of 1628 2996 msedge.exe 84 PID 2996 wrote to memory of 1628 2996 msedge.exe 84 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85 PID 2996 wrote to memory of 2376 2996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabba2a4ebc4df1922f603df94dc795a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540646f8,0x7ff854064708,0x7ff8540647182⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9056198241330193967,9216904435758772343,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:64
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
602B
MD50859d6b159cfc0ee611a25363d24f2b1
SHA13edd3f12309ca2149a2f8aafa026d78da2d88044
SHA256c7a2b836907e2a23a15d3caff43d4234318446999921c751cb8ca608c4811491
SHA5120ae3d7612acee8d6a6d4c74242587a73df9420585a6de17c5a0f781b01182501081c492065590c77980f211b7a9874610ab6b51b7d36342f4589008943f92a4b
-
Filesize
5KB
MD52219aba80e281c001cc88ebf3ca9a00c
SHA141877fb02c5a8a0fe62d303dab37bd346b7f2a8f
SHA256de44fcc4ac5ce03620f934659041c6a1ae502ecd91d9aa7df18fdc74e61dbaf4
SHA512e1a2f82311c3bf318f63b577a30b67a9a842d6e0a4d7c91f078baa26b7f504c9c8c279d7a4d3ebea2bc78e25856e7476a73b53b65cae0f799b789c31b90365c3
-
Filesize
6KB
MD59774046666d227edbf63024f98932e28
SHA143ccb1c408842046a4f789aa11435f0f91c2d2c9
SHA256de56d9830842259b9e1ceb8ab3ece6ebd7310f3c69fc1b32d1983655a9811700
SHA512a10d6cd12ba946e61dd22fcef63e21f0b4850d9ee1ce919412ef43d642f9cab69c966d22a3fe947833c67c197eca19cc5517e49f95e331d7fd1f2fd608ebf950
-
Filesize
10KB
MD56b0010f7410fa7a0cbfb0dc371a4a1cd
SHA1f2a1b50304d58af7789606aeea06cbd614ae89e5
SHA256f35934fc126c11826723ad9d209a37f1c32d782e21ecefed351fb10926c9676c
SHA5126e4bf831cdf2a5b274dbe94332921498e6595966a3b22aa6699554fe7f32288f0eab7d4746c9f7d486f3ac51460436774d345aad1af05741d6ec812337691503