Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html
-
Size
19KB
-
MD5
eabbc72f5dc681e30782edbd12d8ad6f
-
SHA1
3c409b15ce0e3736983540055346c8f8c52ad333
-
SHA256
3b97c624ef52341d956bceb390c5832b6e911556477283d6fa0b2b65bf4a056b
-
SHA512
69ee60bb1b16680bf3fd1e6757ce0bfff94a86b9b81f6d668a92e01f2ac24177df6f41819c799ebfc9b60cfca9ef0f90eb9b872539414cfbc8b3be86aa061a26
-
SSDEEP
384:zibKhgESEVBD8c7MZQ3RjJkKzBemLxXucfIk99heTzVc9Hy:zi4SEgc7N3wvmQOIk9SPqS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 892 msedge.exe 892 msedge.exe 4320 msedge.exe 4320 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4348 4320 msedge.exe 82 PID 4320 wrote to memory of 4348 4320 msedge.exe 82 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 2140 4320 msedge.exe 83 PID 4320 wrote to memory of 892 4320 msedge.exe 84 PID 4320 wrote to memory of 892 4320 msedge.exe 84 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85 PID 4320 wrote to memory of 3984 4320 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff914d546f8,0x7ff914d54708,0x7ff914d547182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13750007288997462474,582603943563161601,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD53144dbbdae13280812072c2aff5ffd7f
SHA16578f66665e1d08ac4b6ecda1d3f919f6e399d79
SHA256d05cec56129e1181ee7995d196a52810547b2de665bebef0621c34daaf2cf564
SHA512936b6f4e189401243bf29454773bcd13a0ba3ddd3770f8459519d09a3bd22689094bbb4af03261c84751ee3989774c4a6c2e7644e28f49f2c93a866ed508baf9
-
Filesize
6KB
MD55b70386683e14e843eb0bca3c084a606
SHA155337994dc8188a9f4c0b5abb04db62a99f6ba44
SHA2561b445191a86be0f2c01e44b1d0b6e452bafcd359c8e84c775241845118d50491
SHA51250282e57cbfd2b17ec5a6be60815c5949111fc69d910c5465aae95c9d66a47fe5191400f01660021e5887fed08675d1da2c85958d9e8729ddcd203403cb3f4ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD566e28fbae8c14da62c96790c7c1bb8f1
SHA1ea699c1740d39e0a78b6230c025e44bd99d55ba9
SHA256616fc938b21e4a7cc8b2374268c1fcd85516e99d247c9dface6852a779baf16c
SHA512a1be47439ab1bebc2912e6af45be93ee7f36607164223415a75f6f19834d7c43a05de8d839615ab367d3fda0c4eac07492cee0abadcaa093e6d9a5335ae99487