Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
eacc8be42e4c8bc47b6913a65a280742_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacc8be42e4c8bc47b6913a65a280742_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacc8be42e4c8bc47b6913a65a280742_JaffaCakes118.html
-
Size
4KB
-
MD5
eacc8be42e4c8bc47b6913a65a280742
-
SHA1
8ad2befecf4cde40178ea32c99a3ab89d4600c6f
-
SHA256
67879f807ee435c126fa2d268fdcb124780c671b92c4020710f8700e5bd24c33
-
SHA512
55704e7fd862af42df96739111e1bd145b27f62705b73a93f509bdb9f0de1770256e939d9d5b6156a7ed6075bf2ad81aa88a56acbb3b43c81b6fef16d1b8bb61
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oQc4XDid:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 4568 msedge.exe 4568 msedge.exe 3652 identity_helper.exe 3652 identity_helper.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 2924 4568 msedge.exe 84 PID 4568 wrote to memory of 2924 4568 msedge.exe 84 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 2092 4568 msedge.exe 85 PID 4568 wrote to memory of 1464 4568 msedge.exe 86 PID 4568 wrote to memory of 1464 4568 msedge.exe 86 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87 PID 4568 wrote to memory of 980 4568 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacc8be42e4c8bc47b6913a65a280742_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad63c46f8,0x7ffad63c4708,0x7ffad63c47182⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2156 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5856908145585294435,18414501973928635406,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
292B
MD56bea856aee6fbda385a45799f9eb45bf
SHA1660f97e103a2b89c73d262fa63e8b04bd8d00977
SHA25692cde2970a54c2e2dd987a6cebff51a3c2a15f6a08c1996d35ea1122456d966e
SHA51253e51e7cf8aa6f867d41c851ce5bd13fb879a10e97c2490fb920f6375aa620b4456c4bead00466f291f8548d6fbde9fe0679f7b1ff9d9eeb67f6c29f3743d311
-
Filesize
6KB
MD5fe182fad2714a1337b767c28e9f65b9e
SHA1161b0e6d80cd18e5824ae26fd73ef0f1f838ed28
SHA25689e4f20335c686ac3991eea9e1f89d797aa37645a652ccac5fb9a6532928a003
SHA512c44de85758814d33b562628df8e4b5224e3ea9291dc3b20a82f2cb4dfebd1da121c03ee9955b4025df7adb097488fd3e29d0a13ed3dab76551ee723f6bba3e21
-
Filesize
6KB
MD5b153cc2dcd096d20ebc9d1f93cc1ce68
SHA1b9d5aad1c2e1615042d7d23970209494bc96637e
SHA2561be07d6d77d83d783307592baf9e0268b9c1236b4547ec8492e0919241a1c6c1
SHA5120a746d8ad02c472a2751005b8b1390b106d4b6a7b7938978ce5623de62d695874cb1df05b5a67bfd762bdf260b5db9d92e0f1bdf906a2a8b3eaf4d2ee89eddab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e7a3cb3398d24e04d9779190cb1470d4
SHA1a982c8b101de192b55f082395b4ec0001a2ef66e
SHA256cdf7b04826c306887f9b5fba9de22da76d30d98a5cb11167981483a5fa53b6fe
SHA512096dc10fab76befed4b207b9fe3801a600758c373a729ed5e4079e31a3fe1754e04abf8ef18b70776d6ea955df63d9098fa237b0bec61cb57d78b1f3aa0ac1d4