Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
eacd97de0b17a8a10000bad1603d2ae8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacd97de0b17a8a10000bad1603d2ae8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacd97de0b17a8a10000bad1603d2ae8_JaffaCakes118.html
-
Size
252KB
-
MD5
eacd97de0b17a8a10000bad1603d2ae8
-
SHA1
2f29a7f4fafc1f1d95b547a79ea78d8f44e4d433
-
SHA256
b5949af096739f61dff8f807d5556d27ae04e9fe1fdfb2a33a3725a531e9480e
-
SHA512
33b893702650e4288a1e79451ff96731ae08135912f3ece6003aba27261e8e823a0c5cb3df72934b4d2e702ad78a565280dc7c2b9d14a6dbdc52a2a425bc93fc
-
SSDEEP
3072:RUsCWDxYxQ2PDxYxC2Q/Z1ssoExJcM05eN+DU8wfuhzSNE7jzCqez6jL3XO:RUs1DxYxQ2PDxYxC2Q/Zo5eRu8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2392 msedge.exe 2392 msedge.exe 1596 identity_helper.exe 1596 identity_helper.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 4072 2392 msedge.exe 82 PID 2392 wrote to memory of 4072 2392 msedge.exe 82 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 3012 2392 msedge.exe 83 PID 2392 wrote to memory of 2024 2392 msedge.exe 84 PID 2392 wrote to memory of 2024 2392 msedge.exe 84 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85 PID 2392 wrote to memory of 1432 2392 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacd97de0b17a8a10000bad1603d2ae8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3b9b46f8,0x7fff3b9b4708,0x7fff3b9b47182⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,13724411084948694792,13953427926922965035,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
1KB
MD593b565ae28c25f7223c90f96ff93ff85
SHA1c1cc4ba35c542310f075e6647d870de7f8860d2a
SHA256aa41c7b81de5b643a8d060830c5f371c019e4f7373a5bd646a77bf377bdb1347
SHA5128646527f9a173bc1b23fdd6b0924bc694c919e9d0ae23967aaf55c2dc0a5929da7ab37cf87009b8cd3ab926283defdd31a20f842807d74d5c5bcba669ce82ef2
-
Filesize
5KB
MD51666048e3bb37df0be72110eddd765e2
SHA1ca7d0ce907aa1043596fbec80dc4efafd1ca4411
SHA256612ac27994ba49c30847d482b821de335042bae71e9f98115e99ec60e5d5232e
SHA512dcd4e66021c8d81b9ae3ff8a02262dcc2ad7a5d6e9b1f3262bda1e653d742fdf43fee46d7a318633ab62f04bfd19de78bb97243f805684137f2131f612813f73
-
Filesize
7KB
MD584d9ca4a7131348b55a3a8fd67d311f7
SHA1a05d08c6b9b56d751a600c2e247748697b27bf5e
SHA256ee5943730fb8ad26cb6fc252df42818b429fab00a7b39f7a178c076b6a2b9f48
SHA512f3bd2b1518f8cf5d59e396c3bf6962a535b1b46006339755ccd426b2cee77dab6fe5be792be01062c4c02918e3b7771686d9e4f69be0d55bca5ef93b4aa83b8e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e81e73d23dcf3781f845978c900607ca
SHA157a04497831ea40e1f7fc501a4d160d1b604f356
SHA2562534e118c5767b7b595a05493aac0244e0be6479352601899965ddcc87655c7a
SHA512b725c275fe6dc7756448268aec32e84fb76fd992dd046a30a71b570a900c63a5788e1d235bab617b3cf103c66fc8e023a1b977c166915f676f91595291b0ce73