Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
eacadd87c62042457aaa69da4ab342db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacadd87c62042457aaa69da4ab342db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacadd87c62042457aaa69da4ab342db_JaffaCakes118.html
-
Size
70KB
-
MD5
eacadd87c62042457aaa69da4ab342db
-
SHA1
a84b06a5c71f7c703c4f624a82a0c6326c7ee8b1
-
SHA256
d2cfe995852e74ba2e889fa7779f19aebb2f63b37735aaaa5f2623c6f43ff5e9
-
SHA512
81e5a6b682429c743a1745114a87a270c52bec9a3bc579f9cf6f4eea5fbd93afabf19abd3ac7d11a534a63412778786b94abb14566dcb0325f7c512a02cc8c7a
-
SSDEEP
768:SK018NjfkA+ztJ1dLKldV6t44q1ox6w9/Tvt5t6GRIuSyJVrvKEW:SK018Njfv+z7C4RH6GRIuSyJs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 3980 msedge.exe 3980 msedge.exe 4856 identity_helper.exe 4856 identity_helper.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4972 3980 msedge.exe 82 PID 3980 wrote to memory of 4972 3980 msedge.exe 82 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 2476 3980 msedge.exe 83 PID 3980 wrote to memory of 1704 3980 msedge.exe 84 PID 3980 wrote to memory of 1704 3980 msedge.exe 84 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85 PID 3980 wrote to memory of 3724 3980 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacadd87c62042457aaa69da4ab342db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe2446f8,0x7ffdbe244708,0x7ffdbe2447182⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,5321435218721932275,1126551972884595958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5386e3e6dff671be7c57b11eae222b16b
SHA136f24b053a37cf9cc7bd9ecc5c2139c6eb144140
SHA256ef0d847dcfca638fb2da4b3efd2769953e29a130e427edc45ee01c11e653be7e
SHA512f18673244f28616f4f8f60819ed04f11b9cc3ccf7819e80d7283d43c7107fb34a8317235f5839caaf9e63f9200ac2188c356ad041ac51da0f5ea5cf65d9480d9
-
Filesize
2KB
MD5176ddbb2f912108dee54a6cc3d35747c
SHA1250086afdce1b061957958575d96393ed35eb8d4
SHA25651be085101e63f72d4b3eea543250ffe0d6d11c323fd196b1f612067073d44b5
SHA5125fcfa9a837a0b9b913a00b5ce6871b8091ae6e4be7aceb9cb8e06bb279b9dc0a115fb9ec2f026bdfebc13efb497800986d25e175453372ed649e7841eea235c0
-
Filesize
2KB
MD57d60b7a1849793af8aa298a53a81dbdf
SHA1f32d3e62374f7455d8d7e11fb871049eb45eb1c4
SHA2569c4463f16b32e4110b3673272245e7e35a6040b4c7428a71867cb9e1c2b1f32c
SHA5120531a8691e02535a091a5a3c36edb3c35e9fcff23e62e43edd3d56e01a83d34c0955208345bea3ff8ccfa3b59061776390ee84dd73d9bb351bd201fb938174b5
-
Filesize
5KB
MD5f2ef5a3f9b7aeb238f3dc7640e433898
SHA1e12ee4e0b91226bcdc130c7eab7100074eb0c186
SHA25612538ba306acf430f39a7b7ece25e23a98811f9fc06e4b43b38c995edf886fde
SHA512058d7030a3b4a98b87ee0058a390aca7b1d7da47f8508f26df34af372e2e46af45710c135001c9e6bebc894f19ad78c99078ec3915de87697b4148b51ff0da96
-
Filesize
7KB
MD5a0288f2394690491fbb748de41afb1b7
SHA12b42c927bb80c4ab85d57fa81e9769cc35144994
SHA256a026b89277a2228d9b6e9baca194c7b6d5c104d56c2633adebae89d10d9e9b15
SHA512af8a1a7c3df58b7ab9778e5c7730a1f43862b89a2f4321a92e70816e1a67e10e8bd820b8b988a00faea77f9cf1aa72706272778875b602c66d51e52cabc11789
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5229ac9c2548c9d578e37968ed165a2c9
SHA1b2f4733e675fed43a7a17568ce43f51988ebfa7e
SHA256b77520513a94b86c670c5a986c383d5f2f8d24b24de941165b5465055e2a8696
SHA5120d953e9f480ff44a5d1ac9904f3003db2f3eab5bdeb572658f2efe2f91420468192ccd8e448fe2f7a6007b23672d52b1079da5b5c4baac45181f59f73d0f20df