Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
eaca0c89cdb050725b737a0b5973948c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaca0c89cdb050725b737a0b5973948c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaca0c89cdb050725b737a0b5973948c_JaffaCakes118.html
-
Size
24KB
-
MD5
eaca0c89cdb050725b737a0b5973948c
-
SHA1
22bfdd1d083c4bafd62a403d9d25ee82705eda25
-
SHA256
30117463f125cc8fe1d93b2acec7a8c7a30bc1f76e0bd8d685a4fd38b6c4f37f
-
SHA512
fda571ee2fd3b27644c4373f894068d81b6283568539510dde39d97681389340d274d2b527c090d66bf1c42fb11470ee6df1a5c7d4b45d286f20cd3b3a42f4f3
-
SSDEEP
192:CpnHJ7dsUzsbFbyrwyNQZTrs52rdH7eHOut6lHjsrunX0HS12W/L2OYHfFTeJn+v:IH938FWb52rVsrA1NqDfFTeJn+zEI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4952 msedge.exe 4952 msedge.exe 4348 identity_helper.exe 4348 identity_helper.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1132 4952 msedge.exe 82 PID 4952 wrote to memory of 1132 4952 msedge.exe 82 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 2868 4952 msedge.exe 83 PID 4952 wrote to memory of 4268 4952 msedge.exe 84 PID 4952 wrote to memory of 4268 4952 msedge.exe 84 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85 PID 4952 wrote to memory of 1576 4952 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaca0c89cdb050725b737a0b5973948c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2049714533961789663,2100925499409518597,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5045d9b4eb3f64f04caa09a29739b515b
SHA12fcd0b3e18dcc9b25dd2c42253356ecd432d67cb
SHA256fec8215995a5a1fa0c37f2dda6d5af4120b6bb6d763147ae786aa0bfdf9aa3d2
SHA512cd344d5d0c8005422d60e2724c69794ff1fcc6f4b1e77c5a7b5803aa8345b85d9205cd7dac2369ae7843d984f85a899ea7c4448ad764ef6bb53fac450bb9a571
-
Filesize
6KB
MD575226219807ff14d4da9438eacb545d9
SHA1e45dae6517d69c988c06fc9d9b94c62ed46acbab
SHA256925aa334cbabc999e87f97d60f1fde22eb6ce8359431e33840bf25d19da8f458
SHA512a19a41dc47aa157d8206756fa7805b44fa51bd1b54e1ad667e09075280fa32e6699f5b90f890adcc58326dde5f8ddea2e54fc42d64ef867fba141919186111ae
-
Filesize
6KB
MD540a671072ec1976d1077636483427ed4
SHA1a11b81c8b547b8382e75751b0f3e0af1ed8d77b4
SHA2563f4fc4ff90bf5a559d6c767b6b586002d976005b2ab95df75ce248822cb433c2
SHA512dc77457712a4ee29bd3360d0cdb55067c9870d6e227322a6e27b0952fd80de6b616cb8ddbc7a417a676cf67786be7bbee42437a673dd9bc5aad96a41ed9fc1ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a6749736111bbab8d80b6f1c2422ecf2
SHA13229413bf6836cc0fcc0adb7789c1fce56d4fd09
SHA2569d71389b0123ccfd8dee886b7825b6dcc81f8325ee8d6941644c0d3325d43c52
SHA512e8fdb605892860c23e2f03a70baf87701cdade5c4e90b48efe9136ab5f373ee0c134727d124c0bb2c65a796f29e4249accc2ddf9f5c6ad71a8f889494a2b1815