Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
eac4633e34c41cd6f3e97baa382b58c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac4633e34c41cd6f3e97baa382b58c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac4633e34c41cd6f3e97baa382b58c6_JaffaCakes118.html
-
Size
15KB
-
MD5
eac4633e34c41cd6f3e97baa382b58c6
-
SHA1
d60608b5a0a6a5e8897af592d8c02b68126cb3ef
-
SHA256
61532344adf684bdf1572fe046ebb5202697bcbf710c2b21ca21846da970dbe8
-
SHA512
53aefe0162cba4298d43d7881ca0889a399ff5cbbe9f91fd18d2338db5017881d3dab4880046b3a1964c07c18190473b2032d7d44e6dcea99ad5ea782d2e704d
-
SSDEEP
192:5rhN5jcpdfvj7FppS+qEO2Ln9ip8PpQCPFs1cE6NnNHUunxwcoTUYxuUGylmP3KG:1NcbvjpOEOCQcpQCpNuixwcoYiuU9J2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 3300 msedge.exe 3300 msedge.exe 2216 identity_helper.exe 2216 identity_helper.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 552 3300 msedge.exe 82 PID 3300 wrote to memory of 552 3300 msedge.exe 82 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 1756 3300 msedge.exe 83 PID 3300 wrote to memory of 4716 3300 msedge.exe 84 PID 3300 wrote to memory of 4716 3300 msedge.exe 84 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85 PID 3300 wrote to memory of 1548 3300 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac4633e34c41cd6f3e97baa382b58c6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccaf746f8,0x7ffccaf74708,0x7ffccaf747182⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,4990071321966333838,13916194662740924430,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5ab488321a4553b58c9963b26e0468221
SHA13a886f832543210d75f5b559b31aeb1d7610167f
SHA256f0ea1428577594639f40b27646ca9a58b618dc58400d6c645b3b6c37424c38d3
SHA512d14b2a41fb565efe86def5baf5e6aa87705a32211dfe6852634f461b9a35a7c2c38b84dbb95ae1dec136c8b1331206e6996a05756139d8a57b5d54fb41dbf20f
-
Filesize
1KB
MD5fd2ddaffdc50967ddfceb493bb00e8fa
SHA154b42be8acc646b46b389aa8b2d174b0d02d5fd2
SHA256291c9c4be537a72aad6dc14ba4cdb8ce46f8744486ee878caa8e9faa2b410bdc
SHA512c6de03c7e959dc6e0bfcdf70723c01d91185f4054e941a470345341696d45f2e1c77763d0fec329ca4ec06416ea3fa7f4961f0eddb87f4fdbb6f0952115e447f
-
Filesize
5KB
MD5aeb1d609cedaea9e42a8d38b23c06087
SHA1fc76d8ddf9f8b6a93ddd362681ebdfe00ff7de29
SHA256fd4d9847254b4fce70e40273125493adc676e6ed57e4b5218391916e0f411754
SHA512e5cb3cc0f215c2f82273abaf8b7a341d947529807716431edd3a5da6dacd222e044bd98ae60fd5766d322e2c55ea0aaa8ca7c005a763b26e49453ca57b5aea12
-
Filesize
6KB
MD51b63fd53974d474384c6d286ac3d219e
SHA138ad1a9156b2f2b2c1fce15201447c31df1da665
SHA2564c6fc3cf31eaf554e83a6a5f09cb0b828000ed03633adfb152701afe0ed718e1
SHA5120cc419af5790a5919d5837330bbfbf734215856f736d7b659c0b1a02a91d6500731d4aa1843933a8c88f82eb48bee589b781bf19e29ae42f2c1516fd10c2dc15
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD564e905230f5c5ca70ad1ece46352d7be
SHA1cb68c0c1018c496a7b44c6003b4be22fc2d50111
SHA256ed981511ff0973bf4b59f10b974b60b4bf85623cb8465dc75f900eace291d7d8
SHA512f3f663e8ff53db6fab8307f4b17fd346810bee297ac7e6839b6c01efdd12348ef90165d7c140412a74f3432fad8595a36da15abcce948ab241d3e3ee4dcd7628