Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
eac41cc9d097ebaf0ed4ca06aff44947_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac41cc9d097ebaf0ed4ca06aff44947_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac41cc9d097ebaf0ed4ca06aff44947_JaffaCakes118.html
-
Size
228KB
-
MD5
eac41cc9d097ebaf0ed4ca06aff44947
-
SHA1
f58985c4a54f2fbd59d2b40e3bd145261e5b2e9a
-
SHA256
605978c451623b17a744894b60174c383dbde21d947c2937fbc8a4fac872f4d6
-
SHA512
a9584765e68aafc6e5d720c2c592ef200340fa39a59306c9f9e12436c6e0267a31283baa6599021d99da5885d5d68b45462045945a91f9a201e95388c2b479d9
-
SSDEEP
3072:spICF3+AwlxVg7L5HdFnQ3Fnkz7QFzQ/FkZC:s1F3+AwlxVg7L59FnQ3FnkzUFzQ/Fb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 540 msedge.exe 540 msedge.exe 3152 msedge.exe 3152 msedge.exe 1448 identity_helper.exe 1448 identity_helper.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2548 3152 msedge.exe 82 PID 3152 wrote to memory of 2548 3152 msedge.exe 82 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 3264 3152 msedge.exe 83 PID 3152 wrote to memory of 540 3152 msedge.exe 84 PID 3152 wrote to memory of 540 3152 msedge.exe 84 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85 PID 3152 wrote to memory of 4380 3152 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac41cc9d097ebaf0ed4ca06aff44947_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb026546f8,0x7ffb02654708,0x7ffb026547182⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2772 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1808 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,13180426041741795030,3337517528046638355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
879B
MD5efea49a03454a0bb166fabf9e97e637c
SHA1996203c190a4b37f3b5ed200a4fb7604e46d8879
SHA2569f1d473257bc2f822e95fb8afbffb3a5a5e763188b4976e141a145bcc1620a3c
SHA51295edfec11f01caa9f459e8a16b3be8f227862fa0abe53a63c643a2e546f289abf2509dd30e50d37490db59b765d70b2c1250437e7726487a75be6fe21b96294d
-
Filesize
5KB
MD5222ab1d6ad57bb3c15035d883db1ca92
SHA1e25218be91ec6a51f346ed361738ffb9ef92eaf4
SHA2560b8457f784eb4b2d63f1f5b38f74212dee79fa5c81afa5ce9989716040ec18eb
SHA51264cd95ccf5c485275c00580ebcb79bcb7972c13d5a2b56cc7fc00df460885c8554fb6096e848fd3b71e462b629cecd12d5ce270c1a7de4fe470577dbbe3cb7dc
-
Filesize
6KB
MD5046a7c3b6ce32c9799c5986c53c29b59
SHA11b28f672673b4e73ef3b44ba8b8015038489db29
SHA256126516a68784e48a644a3f671b43bb0a4ae53c9e79db60fd258fa4d3525a0582
SHA512e7b295ce4b38475b0d27db62dffe7e1a139765d89cc38e66e6b6c7c588cf02f5b7da5e23cea0bc7b8efe69e09249078bc2927e0275e9b39148c18d14c425881e
-
Filesize
6KB
MD513f4a67d4123bace8cde04ae332a369a
SHA1ea59175ad960b8882d86ce3975de9b030e3d46a1
SHA2564438891c37dd10b85c4ddb49b10fc2d3c3fa132df1d0f8e80a49052767ce0ba3
SHA51232a4adb223216caaf3539a81ad154b0733775cf718c51b547a571cc0996fe5566bc84ae588f67aefd6a4d9d01614a474377c543423175155d89cc5aecada0de7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d1251d0dc0bae6aa88da3f7459415191
SHA18e90abe0a8f2463fc6e6140ea6be462dd025a391
SHA256e3c3aeb54b745578bde5c4f70942fce132db5d4aa9c66c2998448eda528e9ec5
SHA512631a364073358cc9141f705dc7a9f6e82f70e82f0bdabeccc937c7272289ebaa78a103649b6eb401623687c1c98400c0c588ac562c52c15d8d142de210b3df25