Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
eac8af10c8aa05805c7261816af29bca_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac8af10c8aa05805c7261816af29bca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac8af10c8aa05805c7261816af29bca_JaffaCakes118.html
-
Size
42KB
-
MD5
eac8af10c8aa05805c7261816af29bca
-
SHA1
93b3509cc70f406113a7264e5647a30d78f9691c
-
SHA256
416a8898176c3ab7f09f25153daf310b1dc4fedcac3a2d26c569ed1e13c9608d
-
SHA512
718c14428bdedd22312fbd46974acf62e3854252574bf37b74d0bc419af0b8293867f6ee88312215c7ab000b80b94a0bab282477728e8f3ed5e80b0060479554
-
SSDEEP
768:Zcd9QZBC7mOdMgcpC5I9nC4qzpLKGddswBwowKThbPd:gQZBCCOdQ0IxCXzpLKcdswBwowqhbPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 316 msedge.exe 316 msedge.exe 3012 msedge.exe 3012 msedge.exe 3560 identity_helper.exe 3560 identity_helper.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2948 3012 msedge.exe 81 PID 3012 wrote to memory of 2948 3012 msedge.exe 81 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 3696 3012 msedge.exe 82 PID 3012 wrote to memory of 316 3012 msedge.exe 83 PID 3012 wrote to memory of 316 3012 msedge.exe 83 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84 PID 3012 wrote to memory of 3468 3012 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac8af10c8aa05805c7261816af29bca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe024c46f8,0x7ffe024c4708,0x7ffe024c47182⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6384 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,13627574346029670130,10184861441722707853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5557e4ca9e2f3fab69d355d0a50b53005
SHA1583547bf9a9a5812568f49174e3d2b91bcc2ccc2
SHA256bc8a15f68e4f8fb7d707627578decab3533923a1824e43cfd9eee7ae1acab3f2
SHA512be8e6493f0518cf2c78ebb87bf3ffdb52133ebf8bdbae78ae6d3d7756c842eabff2b28c74a60206a89ed50f76c417713038af4d4ec13e68310589a5eada2dc2d
-
Filesize
1KB
MD5ff49333c80375e508c87261922293648
SHA12be7c6b273ef18cef04658313bd02ba602f967df
SHA256ed8fe69e925b542c8f8b250da1c2ddc86a4ecffddf1b694a2f243d29c755b08c
SHA512c2bd48e2ea049d3041903cfade11cb7d164b777738b7cca3320b75f28f08f30d813d6cca81aa9570815e5a0fdc8b462eafe934ca11dd1eff0c3cc09fd44f225c
-
Filesize
6KB
MD537ec2c0a2dea0c2808f8226d2712cd0d
SHA171278258b32f0df2fe740efa63aab2dde87e6bcf
SHA2565812acb0497fa1e63fa3ed64889180fd89c276f8d9252c645ee2bc50a65ff1cb
SHA512d5c2c1e57225757b0bc19a7c798f1d67cec5cc39717a10cf457a61141b486c564815ca40b0e7e4c58b0647418f549153a5196268f0006b8afde257e72c6e8757
-
Filesize
5KB
MD518097548dedf980fbbb7e42ad53b2f67
SHA1af256d00ecbdcf4f527489c59016d30aeb2041bb
SHA256b921798debefb76c59b5f0591db1d62b4f10b9b807e516663eef961d4be00986
SHA512728c868bba24c311e787fbd1b59075ea739ca56484b3c36a18cdf571cc320af8e6f1ae246ef1576b4ac99845ead7173eb57ad4410065d87e14246c35e6f20648
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d66fe55e8150d5d484ac2438b8fcd9ad
SHA182042a381dfac45db7f30ce04c64ed8750ffbdf6
SHA25647f424ab5630135b843a15d4316f0bf9167386e4a71b63b0d0b6f64df94c3e51
SHA512a4c7ca9f91b155b7783b98f49286c4ad83cbf74d119240a84d73ba20406cf969ea608addcd4d3711b08e73dcf7db9fb83759e2626a8c95cf077b8fc93d073aec