Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:38
Static task
static1
Behavioral task
behavioral1
Sample
eac68e5886aa5629e53c72226a5bb8df_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac68e5886aa5629e53c72226a5bb8df_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eac68e5886aa5629e53c72226a5bb8df_JaffaCakes118.html
-
Size
18KB
-
MD5
eac68e5886aa5629e53c72226a5bb8df
-
SHA1
15c214264cc41d59824b1ec386629d02f3a89190
-
SHA256
76b128952ae3b4a770c3e162ebbccb537178ce5d15d741c98e34effda61bbb80
-
SHA512
85133b5ee09c538c9e0fca3bd95cc59df372bf36644fbddc13b63e4eed611658028e87efda8d26df50c493374e8e1109b49567223bf9aee48f5d3efa7c8bc401
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAQx4QzUnjBhEu82qDB8:SIMd0I5nvHgsvEdxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 3464 msedge.exe 3464 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 1040 3464 msedge.exe 84 PID 3464 wrote to memory of 1040 3464 msedge.exe 84 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 1280 3464 msedge.exe 86 PID 3464 wrote to memory of 2992 3464 msedge.exe 87 PID 3464 wrote to memory of 2992 3464 msedge.exe 87 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88 PID 3464 wrote to memory of 3584 3464 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac68e5886aa5629e53c72226a5bb8df_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa710946f8,0x7ffa71094708,0x7ffa710947182⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11793300029310232326,2272570241253115352,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,11793300029310232326,2272570241253115352,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,11793300029310232326,2272570241253115352,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11793300029310232326,2272570241253115352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11793300029310232326,2272570241253115352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11793300029310232326,2272570241253115352,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD5e942ad4770a23c1c7645506cf25f3518
SHA1e337a51a7c6d390271c3fc0b07a59bc168308ca0
SHA25650b86aa0873a7cbcd75a9f014830894e3e0dbae319cbbda692f9a8ba0fa11ae7
SHA512a0550bc51c6604d218c6eded3c80ea86f8c4b4631e6b89646d1cefb5a1f48b5415067171a1332125dfd9e33a8d3d70800ce11052f6da82b57451b151b528a666
-
Filesize
6KB
MD5647d6801a237006b1d7867c5a20ebcbe
SHA155f8fe29a3d6bb2850af6e26ce69f46b5d7df88e
SHA256d2af5efe77963d80b8e67f268b55c045bd54225f861f206da2ee3cd26d74b8ec
SHA512efe06ee1b1af020eede610704e9f55b0edfb9d9d9e051e52a850ae4d8545a022102a25835fe0251b1bf82208b8ee79e941df87a1fa8660642fc58937860d9905
-
Filesize
6KB
MD55b8fb61dc3c7512c06275cfcf4c06784
SHA1f3c9e339aa05ba93997c0954859b7e3006a6deb4
SHA256cee90d4242249f27ad51425f78b541edb7e406673efe09d009de175f08cc5680
SHA512f4fb452d9a4f280f4c3b33c416966720f8f80725ae2c4347bf57d0ac8defacd64b115f205d505582d420f4e5c39a4d28e833180bece50a12555ce549f1122f9d
-
Filesize
10KB
MD51966beecc6629af43f092004fdc6867d
SHA1b3740f6069981799ddf58d4007bcc307cd212ac3
SHA256d374378a34de79987677e2f61b8ec73f525f404ca9c9e69e27780ddb607feeec
SHA51289da9e2e1773876350090fa4d54f13cbed3b9bf82c7f0dc8032493f0b789aecde2873cddbf70e344bce11c81162fc67111f6fbf7874b9085b03b1f990d637eae