Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
eabc6572f9dd914d99d1c003903e5812_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabc6572f9dd914d99d1c003903e5812_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabc6572f9dd914d99d1c003903e5812_JaffaCakes118.html
-
Size
462KB
-
MD5
eabc6572f9dd914d99d1c003903e5812
-
SHA1
01e0ce3a339e269de4def70431216e67d0e61b8f
-
SHA256
edbd51eb66bfd6c2654c62466d1bb4d11f3816919df0a767606109f22b6c67da
-
SHA512
d2675d0ddb8f760034a7a3f6a561e8baa9e62c05e8a28188cd1feeeb4676f1cd33ec8de3d658826027a5d423bcc68d4598960742a9d4ca1a0e85b5ab4b2b4201
-
SSDEEP
6144:S4sMYod+X3oI+YusMYod+X3oI+Y/sMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X325d+X3N5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 2976 msedge.exe 2976 msedge.exe 1144 identity_helper.exe 1144 identity_helper.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 516 2976 msedge.exe 82 PID 2976 wrote to memory of 516 2976 msedge.exe 82 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5096 2976 msedge.exe 83 PID 2976 wrote to memory of 5116 2976 msedge.exe 84 PID 2976 wrote to memory of 5116 2976 msedge.exe 84 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85 PID 2976 wrote to memory of 4164 2976 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eabc6572f9dd914d99d1c003903e5812_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa23db46f8,0x7ffa23db4708,0x7ffa23db47182⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3604267850876031230,6326943541510862373,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD57f9b45d53c639ffad1a599c0e8b19f89
SHA16217948bd72fef789f95e4303f2a84b271e07505
SHA256a69b20dcfa6c990651772b5830b580ba8c7d32cbb6f6526ba0861509888c46f8
SHA51210cc1d2828f1cfe64da94462fdafa685cbb521d3446cae1f2eedbf775d631eac8dab2299698f41aa425b717e48416a115e24780177c93c1f38449eca3e1a120a
-
Filesize
6KB
MD56db25dde5ad826077c03268e9ca0f61a
SHA163690e13930bd0168bcab4273a47e385e3083930
SHA2565e7ed01d038341bb92e04791fdbb64916fe8c671fa8ed5ea27544f46b4c9c193
SHA512f3b8c927285551a03cb4e96a79dfdf7e07d8a9d3f692030e0e0830f01d63ee8af5d73112d2a3250307e41fc408b7c96a9dbd16f14a0456652c62f2afa6beaecb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD519972e3dbe9dfc02305485a4d1721724
SHA1f9c9035578e7e780c44c0d1b62a5f83ae4f9163d
SHA256f0f1f510e4a291f2211ac05481f142b576ec12445ee687082bf39314b78affb1
SHA5128f065160191c143f85f203150a7eba1d0b0686d61d5bc52db12e4b8daa99c661ffa8ab6be130a8a162d83f2c10810eef7a6c105c0cfbe05a446f312a03c1a205