Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
eacc4d678f278138aaf2bdd723324e25_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacc4d678f278138aaf2bdd723324e25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacc4d678f278138aaf2bdd723324e25_JaffaCakes118.html
-
Size
214KB
-
MD5
eacc4d678f278138aaf2bdd723324e25
-
SHA1
c5650ebc08a852a82d0a8bbb6335fb4d62117219
-
SHA256
f4be51e1a815a685c6e46850a88d2b8f41313f261ccfa17760c6efe629ccc084
-
SHA512
8858297d7174bc99e2479a20147c8b3760e67d5dca47a001038eff0a9697d2de0781e36919c7c759a67a6ad9fc26346dfb2769522db6944505dcbc5e8c58e092
-
SSDEEP
1536:PaFGakvSdslqXEVT6ifr7FZvS5Q/sZi0lZGPbA:nDPP0h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 1128 msedge.exe 1128 msedge.exe 3268 identity_helper.exe 3268 identity_helper.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2948 1128 msedge.exe 82 PID 1128 wrote to memory of 2948 1128 msedge.exe 82 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 5100 1128 msedge.exe 83 PID 1128 wrote to memory of 3472 1128 msedge.exe 84 PID 1128 wrote to memory of 3472 1128 msedge.exe 84 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85 PID 1128 wrote to memory of 1764 1128 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacc4d678f278138aaf2bdd723324e25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc49f046f8,0x7ffc49f04708,0x7ffc49f047182⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1316 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7079693350748554929,1869791269625676975,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54cc139f0cd7661849c2bc28fc7fe34ae
SHA1b601997cf5bcace15c9c0ac630fe41fd5c130276
SHA2564fcf3debc9bddf04c25e33bac6f0d26643f247d46d585a7b52a0f665dd316755
SHA51267aecec9ad37b6e9ebc84575e59c0ac63f03c444dd4772906f8e52ea9dc69c9972fb0cf88dde2c74f3c4c0f237da477db1968c6c588a22e3f70be971ae92d762
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD558af9742cfd3a32070b152225e84289c
SHA1d7c4c53f53876114c8245def954cc7d5ac1629c4
SHA256f1cde2995b3f31d0e19ec18b00f1d4f68f6144e253783ffebf93adb8c29a6ec6
SHA512ff91183fa2191f4d59b7022d6158d1fc86c336b1f6da908911995c2a4a0770d1fed08e326c442ec403d1b28588eba0a133dd221d0844d4a6801743d139edaca6
-
Filesize
1KB
MD598e3a199c5c83f3e762a88575f4559c3
SHA1ba497191dc265d95b901143fd977300683103484
SHA256a74e0cdd9a995039390e8f6dc4f63dd2827d70e0e91c6a314f3a36c899a19962
SHA512fbc32d9b79d9b753219e65b1f0c1b0af31feb5724edc9d22beba6530f49df0ceb83b288b0e6423360ed138de23bb4c372a26e711d7be6856ea510f5c54388349
-
Filesize
7KB
MD518a62145bda841d3ca95ce9446b03783
SHA1c316796e8ed5ede3006bb30e52f1124591129b03
SHA256b50fda2efb4dd3c721cce0bcd3327caf58dfb9eeb6a00b587f9d6bf268ede0c2
SHA51248d28123d3cbddd44172ef915b5f534cda3dbf40701ed151475241fc9530c80e056a5e88420ec2286d80555124f51d4753a10202edd5c1419708d28767b7967a
-
Filesize
5KB
MD556ecb22a805e87ccf4db2b5cad46874a
SHA1e8fefc52f3edc51d0eff1c8594fd9f311316d96f
SHA25654f0600211a6fdda5a7f8dc612437d032d0f11b5a624e843373a2699b9d3478e
SHA512fa8a57050ac3f8b0f489463b4bbde02663097f0847b3a8e8d937954aecf1d70969c6cda981a57563bea2248c0cdb332e8f6fadf1c5c8766f2bba17e4c075e488
-
Filesize
6KB
MD51c4c0cb78ad5ecbc320423426af2ee27
SHA10c299f5d61c51bbc4e39e217d00d6ed6f5df1ba4
SHA256b978f76e37564c519bd5c0aa908ae36849d742eff2818d62bedce441703cbb42
SHA512bf907d28095316b18c979afff841a9f197f1c251d86ee0ec6be75191655583f4a81ab9370b77f98f81d4899f8086b3439ca6c33fdef0f537cb210715e9e1dc37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fa51559731e4d8d9358dd282a7165e3c
SHA1049250f03130b6db7517df7583648737a49d94b8
SHA256708f30bfa88f972d4076b8a491943b5ebda9272721457bb20ed9154f3415a48c
SHA51213a39cf9732b44765f4aa9106b36c2e215dd69abb9bcb5f732c306c18a49484d479951c7129a2bfd1e80990678be573be8c182b847b30598c13d163e06ea7119