Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
eac40e39ecd59c6a3ad14ca40df4700e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac40e39ecd59c6a3ad14ca40df4700e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac40e39ecd59c6a3ad14ca40df4700e_JaffaCakes118.html
-
Size
336KB
-
MD5
eac40e39ecd59c6a3ad14ca40df4700e
-
SHA1
a42fe88b907c0b9d063ea01a49ac828cee2b3d71
-
SHA256
9a9b32ae6cdb4cef92a42e5a001b8a9ecaf109763bd6c8ba970c1f2ed0dce3a8
-
SHA512
84c374fe7cb3feaa062eedad8025dfa83f9680a6e897f9f9e244aa36e108819d0d4da71a2080f3bdd40a89ed184e9f45cd4fcb90d103d26159b383edaabe27e4
-
SSDEEP
1536:1whGsnhQqhUSbemg14fIh99hfMadjouMHYgVI49pHvwVwMcu:1whGsn/hJbemg1t64gVI49pH2wM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 3840 msedge.exe 3840 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3840 wrote to memory of 5092 3840 msedge.exe 82 PID 3840 wrote to memory of 5092 3840 msedge.exe 82 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 3044 3840 msedge.exe 83 PID 3840 wrote to memory of 4820 3840 msedge.exe 84 PID 3840 wrote to memory of 4820 3840 msedge.exe 84 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85 PID 3840 wrote to memory of 3172 3840 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac40e39ecd59c6a3ad14ca40df4700e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabc4646f8,0x7ffabc464708,0x7ffabc4647182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6592 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15252966390099756727,15626890933084963769,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
747B
MD5db5dd9025b60b987dee64e4112f5f0f3
SHA107c7198e39b7cea22d46eeb4d6f8f52b72c4bca8
SHA256b03e64871b3d0b7481cb6160d37d2a4a82be004f2cef45bc28ef8c8742adad0d
SHA5128fc490249df628e670a53628701ee32a22624958911117547adfadff09b9608fa0bbdf2e279e490a8f58faab2c882a820547a182592f1643efbc1381d99672b6
-
Filesize
5KB
MD5c825024a9c71fcfcce8a963be8d1d026
SHA1aa952a19f603047560c0b31118be47516b72bd7d
SHA2562778dbc05ceaaab5e9046c352912b2b67e5c3395e2fdb139892a0d0a32269dae
SHA512e6cd5f2a0769cf6c62947eef93b8b9898dfee8169dbca9d9a675bfb83c39b48a99cf9ed88248dcf7111ca0a3ca54564b73cc6220c8f73fa531b335a104600101
-
Filesize
6KB
MD58c570e643dc9254762e2a7aeee745db4
SHA13a501f987bae3729013a63a303922d36c5b22e26
SHA256e3ac009a2217966a96caf7d67fa097a572daebf22c93fe69cd929922cc6e5074
SHA51214a6386f0faa939eeefb96d86ecd96290a91add7e3f68ab84c9c6f4113fc80bbda9a243c076c31c7da6485c58426325d829e55d41056e5cba6331ba3d1ac2ed4
-
Filesize
6KB
MD5cf823af7fee23e11d64eea011814244e
SHA146ea9784d8b5b60bfb069dcc1f194223c03c91dc
SHA25694244ff3d637d6555582a9d04ede790594df04d7455ac79cef2f74f647d30e0f
SHA5124ec863ccd8be75a9610fb20117c343cc186af8f112828a36dc082eb1f7e3ef357447625422c10734f1ef7fd5e4ced21cd75cef028a487bb57482fdeb1006b374
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58a6dd163d059445c8513eafd651d579a
SHA1f2dc8d43a93821cb6a7cb1ae4a6725802777d066
SHA256ee588ef2159f6dc01a3f28a9af8394b68e8d9b101c0b5ab7e8447767a57e7769
SHA512b8081fdbfe939e150d56b3e2a4088a13c2a3b2b78a5c6054129e094a0cecc16c5a907ad037f849042014f0e0c8f5bb5959106011dee34bf78c70a1b8c2bc960c