Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
eacca33e89e57b1c3aa5fbaf3148ce46_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacca33e89e57b1c3aa5fbaf3148ce46_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacca33e89e57b1c3aa5fbaf3148ce46_JaffaCakes118.html
-
Size
145KB
-
MD5
eacca33e89e57b1c3aa5fbaf3148ce46
-
SHA1
a668fef2961b5dd250d48abf92af79a985744b36
-
SHA256
dfddc4bb7fc4e8598a7494488558f5dcabd24b3abdecf5966198cbbb15a3d51d
-
SHA512
f563630f58aa5abaaab808cd2daaef23707dab39af35a4fe9e49b4968257db3cdb09172b8174227437fc19e61c16c78df827d36b6bdb00f1224f6a2ddf8284bf
-
SSDEEP
1536:Sy5+8exswp9Cqb8JVczVsEQIzVYlD64IdQD4xGgeHhLze5xEUKV3Sn+siZUMy7Dy:S+wpcqb6VMsAzVYlD64n/Q+
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 46 pastebin.com 47 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 728 msedge.exe 728 msedge.exe 4340 identity_helper.exe 4340 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 1184 728 msedge.exe 82 PID 728 wrote to memory of 1184 728 msedge.exe 82 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 1572 728 msedge.exe 83 PID 728 wrote to memory of 3224 728 msedge.exe 84 PID 728 wrote to memory of 3224 728 msedge.exe 84 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85 PID 728 wrote to memory of 4824 728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacca33e89e57b1c3aa5fbaf3148ce46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9984b46f8,0x7ff9984b4708,0x7ff9984b47182⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5638040798134850210,8588026722497623384,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD523c88c88339ea799271d53d0ec5b020b
SHA16c199d78effaa9ff01a26a67ebdac73448e1382e
SHA256cd42dedc0a8fb0cdc42009fa64464882cb41749bf04243ca927ec3ecaa16c20c
SHA51260ea512bcd3f8142d4f6528264361b112726c68ad3c77b7778863730124b0a208ff4ef6ad09c907a1577d29ad3d39d23732a017efb153b12bf28c0b8e4692038
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
547B
MD571f5d0efeeeb5ea5a19f911a2487a396
SHA11a7ac23d36502770036f36864389d4d02630da53
SHA2564ea907d1c82c4e01ea28900ac46c4660fac1c487df1cbeaedaafaa263d042a8b
SHA512566467ccb19b93131fd7fcfd38fd3ee97c57910d4b85276aab98a34690f2025a58e86d1d1ef7864a900814e36fd289b8ad831dea7ac96ca7deea8b6de43b37c0
-
Filesize
5KB
MD599bf33ab3afd3ff867a32a7810aca946
SHA156468a84b5580efcdb2fd96d89536d542b74460a
SHA256288c6e0f903715772db84620e5bb3a689b8a88a2a09c29734267273460b812c0
SHA5126b586f23cb0fcf23ac727de8d5b83dc5205ba744b028962460c417c027598f10ddb8547f2e9f7f23ec4b9155c2ea76762c7a8d9f4c977f052fdd24f22a4d44a7
-
Filesize
6KB
MD5bf383657a8a222cb73d3a4c3f8a572f5
SHA1432d4f2017bf42b15ac861f5ca99c924d78d53fb
SHA256ce8743de3e39759d24b71c875089d7290b63bfae2eb156a9e9723d94254b06c3
SHA5126a3df1c438d56aa386ad6b48db3b562105cdfeb8142c1d8c81722695b32c0c7840d4f83b3038004ee7e52b50471846c5c4260238fcbd05d52ebacbf4bef6cdcd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389