Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
eace8aa2b6eb77d1b4a71f98f75e4daf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eace8aa2b6eb77d1b4a71f98f75e4daf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eace8aa2b6eb77d1b4a71f98f75e4daf_JaffaCakes118.html
-
Size
4KB
-
MD5
eace8aa2b6eb77d1b4a71f98f75e4daf
-
SHA1
f1395d45e2e79b2284746bd95f5249130073f30e
-
SHA256
d225a6dec782c043fae43c9cbfd9b5492af39b3dc4b0a356288d8d7d1b64c54e
-
SHA512
9a094a559bda025bc0153b574baab0f28ef7e059ca2ca95bc21ea0677304fab6cd984b276c98c248bcb5b561c06129c1d26240aaf03a6f45301b6b9e4049b3d8
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8orkyF3Yd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 1944 msedge.exe 1944 msedge.exe 1708 identity_helper.exe 1708 identity_helper.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2312 1944 msedge.exe 82 PID 1944 wrote to memory of 2312 1944 msedge.exe 82 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 5108 1944 msedge.exe 83 PID 1944 wrote to memory of 4476 1944 msedge.exe 84 PID 1944 wrote to memory of 4476 1944 msedge.exe 84 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85 PID 1944 wrote to memory of 2776 1944 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eace8aa2b6eb77d1b4a71f98f75e4daf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2296 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,14407302034759849610,945530051610141134,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
292B
MD594371d391acbc8432704c0477b728c28
SHA18a71850b81e0276631664a932d63c2e9645c04bd
SHA2561f701b0e99058a48ef86659136d62dde08cc39eff07c99b45f0889227dc3cca9
SHA512cb280a575c4e7e97be27008ca6911ab34bc53d427024de028b9b8e0e564e5b8912151d4226d490f1294944f0a359e94343c41d701d1554346c7a627964eb60e1
-
Filesize
6KB
MD5815f50a290772e6c7ebe9aa0ab0b2b0f
SHA1c6ee085062b4b48695c6daaa78bcdef56f55906e
SHA2569ff0041e98098355a6100d942552c84eabb86d1e669e05aefaf255d6db604097
SHA51220e2528e242d0ec1e8e6adef847efbbe07cdbb7d43764dca2e98076fe723ffca5c9746ccc006a68826f82f76b6e01853ccc92a09d9e938bcb52399ab64b33f1d
-
Filesize
5KB
MD512f3365f877390903c4d01179eedeb4a
SHA106d468b00300d6bdfb84afb104f783e7d4e58fa3
SHA256058cd3ff5ef9c8c591d84da3d12d2a7c7b00f8dfefbc4c8d6cef5bb83f2e5921
SHA512f3fa6556f110ecf1f9735d498bf0676d3823cb3c89a5aae4e51c9055e22e083334db86bca0c83387dab83c8edbba708629c986504c9940178e60fa0ef3fd49a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50dc2ce8db9e7ff5f33c8e6dadf5f5a11
SHA1f84f74f35488f4f77f20b44bc39c1d7ab532a08a
SHA256e2dd9e14a37ed4e545481e3bbca869c0167aae801ec3f847fd60f11c2fbae673
SHA512e550f944881f89bdb67b884598684d046acc5eaa6c5be5ec3c91171e65bb790be8c2cbbc22056d440ee8547e6417c4476840d3c7c6bda7b739347eba58de183f