Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
eac3b9261c0357d3203d69ab47ecd204_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac3b9261c0357d3203d69ab47ecd204_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac3b9261c0357d3203d69ab47ecd204_JaffaCakes118.html
-
Size
112KB
-
MD5
eac3b9261c0357d3203d69ab47ecd204
-
SHA1
e90965a804d0b26e4f1d69b1aa5d2428dcb00f8a
-
SHA256
880b2d4f73471836ff7d352c8cee29c0060ec8b34360f9bb3da322784ebde9df
-
SHA512
92fc0fc6a5a054509b48b81fd30219552c7ecfd140ff21c0e30e4c0d9c07901e31f90625988b8c4008917ea3610fca9625bfd92c5c65b0b3659e34cd3619edfe
-
SSDEEP
1536:3Js639r3bCjAG6SRbWwS2/VFKt6Jw/WlNOVjA3mEPlqKHFn:5btrLsQgM6JwC4VjA3DHFn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 2780 msedge.exe 2780 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4736 2780 msedge.exe 82 PID 2780 wrote to memory of 4736 2780 msedge.exe 82 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4264 2780 msedge.exe 83 PID 2780 wrote to memory of 4772 2780 msedge.exe 84 PID 2780 wrote to memory of 4772 2780 msedge.exe 84 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85 PID 2780 wrote to memory of 4484 2780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac3b9261c0357d3203d69ab47ecd204_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffaba0546f8,0x7ffaba054708,0x7ffaba0547182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14684128613673246991,6339088461925391236,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52d6b6828d29c1dfda3feda7a1070a45f
SHA1853ad2afa1615a3baac7d4e0d33ab9d2f5da5cc0
SHA25626ca64a8bc95fae0027698c50031fea4c98e1442ba61034a480cb3a3d4bd96d5
SHA512db1bf55cadb36af78c08b6bdd66c6f22ad02818f435b41a5dbdac8a994dc700f9805e04daa0ff86e415b8116f12d0f0b914a6a112f014cd416ff21263b8cf393
-
Filesize
852B
MD5ec746f560e098aea0051186e9d85e59c
SHA1839d191020fa3c568b5600c4f08824bc26af83c5
SHA256e6bc2f5fefa6e2a164fa751ceb0b49d9d0c73478a4f16507a91b70058523b98f
SHA51248d71cc021f03f9361adbe8df7a9b05043eb3dcffe3e3915592ae674425563b38bd4c102f6e7659a36977977120c88ca4c038b40c43ac766fa31efb7097befbd
-
Filesize
5KB
MD5b0b0ad04363c3374b5686414036008be
SHA1f2a35579d61182ada11a4046f58df588fc4400ae
SHA2561ee77da76a2f5f218773cbe233852ff814688bb22464de2ea984eded29364995
SHA5121253df0923bec8638a30fe3c775aab49537137715efa5ed44d2cc127ddacb6bb52cc4ef4a6c4b6d881a4dd047618aea28f930f548334f409d09fee770e373b63
-
Filesize
6KB
MD54fe01b413f6ce8b086e73448497fb828
SHA19ddae6911f871f25da3b433852e04f3765632fd9
SHA2567f44808a4d8b1eb93cc3a350ceb3671884ce22ce30d6cc7cbe832cd1c4240c83
SHA51208a7a13243b2922e94640952ab8d62516ea4569670336a5a9e381da801aa37cb056d88a426a3682248892ea9020ed54b45aa9cfb36abe8b2b80db993ad1f5ca0
-
Filesize
10KB
MD513235c628ecf6497dfdabf7f98f0e125
SHA1af343702491e7027525fbabe3d81182d5dab3a8c
SHA256368802dc8cd31d5ae08e220c31472fa8e9f0d2f91f2b257d86f981d2d0987667
SHA5127fdb2563a915d1859c6278c9af4f6e3a6882f8d506f6e3217ff5bb8dbc3ce2be4d10a497d5b0a9f1e171950b874484103963ac974dd7e833fa1d23ac0664a6ec