Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html
-
Size
348KB
-
MD5
eac61f16ccb57c354aaa75b5115cab5f
-
SHA1
9c57e6ed6bfb52ec14ccc3799921da4c2d2bfac3
-
SHA256
5ca3951f13e8c4c8a92f1f03c680f71ec4df6af86dc8fcaecdf5b3ff241c94f9
-
SHA512
315c4e8eabecc8e7e0b3cae718ea7a9b625a148b7571c006034b89a205e4f1f722ea44bf2aaff58107c1992cf27f5a0672118a48808ce4d7e714618951fd1ccd
-
SSDEEP
6144:SasMYod+X3oI+YtZsMYod+X3oI+YAsMYod+X3oI+YQ:d5d+X3R5d+X3Y5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 212 msedge.exe 212 msedge.exe 2384 msedge.exe 2384 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1616 2384 msedge.exe 82 PID 2384 wrote to memory of 1616 2384 msedge.exe 82 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 3852 2384 msedge.exe 83 PID 2384 wrote to memory of 212 2384 msedge.exe 84 PID 2384 wrote to memory of 212 2384 msedge.exe 84 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85 PID 2384 wrote to memory of 4728 2384 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac61f16ccb57c354aaa75b5115cab5f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4076204520394680401,15633284011381008173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4076204520394680401,15633284011381008173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4076204520394680401,15633284011381008173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4076204520394680401,15633284011381008173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4076204520394680401,15633284011381008173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4076204520394680401,15633284011381008173,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5ddb989f2e610ff4f8b67af739d73e4b4
SHA174437e905783f937d14be8043f9b14fe63090ddb
SHA2564682b1bfc11260875b65bd60109fad7009428aa443d440c3c6040c7bcf4b6e54
SHA512436b589295dc7f9116644c6f09e146f4d9b6b627dea6b9b5d76ff3b0f707344f0fdef20894896029adcc2a9b24a955c9f0edf868fcc670ed37c4899cc12d34fb
-
Filesize
6KB
MD5ac4d207494aac3c93e5a971e5a5ea774
SHA16116b4d5b332424c5dcebc08f0ca18dee4945b4d
SHA256bd5ee1f846bcdc22db760c8f76762a570c6ddeca5387b4c029e6c7799e5ff64a
SHA512e8fd0b22285192efb9651dabb11134f98aa0a9795d94d8ea52f1512f5c632081f8ae9c0112adc00f7180f4cc57cd0e0dab7e4232577d13a556815f5400f392f2
-
Filesize
10KB
MD582352c5a5bf1ddd584f5642e9f122a8a
SHA16d03dd348989558d53b3e09882e6efcdd8479cb7
SHA256b69065d3cef356c687726c4c84726931fc20bc9d6d86d8abe401847c2b7c39dc
SHA5123a2b91dcd95938988f169a74d65da85fe6e6a4eccbe9dc17194635f06272a018710aee065b570ec390f8bf4495212a034246748b85e1c16679457fd6268eb521