Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html
-
Size
69KB
-
MD5
eace9ebe5b401673d169f205d0a9ebd5
-
SHA1
d09aecfa3e80c0005cf5586f029320a7acca6fea
-
SHA256
4144b0b83a4a3dcbb27d12ab7c760e01ddd7dbc630d2a83f0cd6a138b3a30d37
-
SHA512
c2d239d46113d08cd8f38afb616edf7c6183b32804d0a3118fe19bda61486e3424335f242a8a11189eee66991ab1553415aabcd79493376b25ec8c0d685a4873
-
SSDEEP
1536:gQZBCCOdp0IxCZxK5m4w10zKkXY9gFhe4GVJFWWHPLwpxFDCpMb82+HsXIJHbhlI:gk2H0Ixx5m4w10zKkIgFhe4GVJFWWHPc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 1196 msedge.exe 1196 msedge.exe 4632 identity_helper.exe 4632 identity_helper.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 3724 1196 msedge.exe 82 PID 1196 wrote to memory of 3724 1196 msedge.exe 82 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 1256 1196 msedge.exe 83 PID 1196 wrote to memory of 3020 1196 msedge.exe 84 PID 1196 wrote to memory of 3020 1196 msedge.exe 84 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85 PID 1196 wrote to memory of 4460 1196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8964d46f8,0x7ff8964d4708,0x7ff8964d47182⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6422191110291110552,15498034198658645509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD55f12fc424ad703eb1227b67bf67ab193
SHA140bd8085280ca3f318a1c73169a798c4d4d508c3
SHA2565405e1c2da9ab7305498615ed63d8a5a2a3c6388a4737a6c971c01751a228e98
SHA51208fb2e00edd21f45c006736fc1d3ebb0ba1d1b38149d260ac57b048f1743df8bbcded7ee47a999cbc0085f318edf43f7f5e96b1188f9294e1a26b25a415dd19a
-
Filesize
1KB
MD51e701d2f2bd55ca0b8eaeab4796479ce
SHA145959be8ca8e567acb3a70a7a7acb273c5cdc1b0
SHA256c8cd38850ee347eedf5b74a0d6beafa4abcc689c1034f105743f74e55f7c0a4f
SHA51233f783c34bdbe65ba586758fd235e8fcf04c1fbf9848ed8b6fa7129d7d9733e3f9b6a981d9eb85be77dcfd40a3c9280cad0edcc4a9843c3182c401d006867707
-
Filesize
5KB
MD5fe40684a61a769e07bfd7dd19f9f3941
SHA116e7b47e02f2cd40a99b3306f1f6d04ebadbf89c
SHA2566d74f5b02f268b903378b88a992c3cf36f477e850de14d1c0dcd75b1a9208c28
SHA5126cbd059fe4d05c27f329fae47e8017c92c7387858bd67ba45c09c0d3dc5040e99bff4209d5708d393245766633b30c1c1742c603504628838b6bbc6faf966f95
-
Filesize
6KB
MD58ba33b22d4ead0eb74fb02aeb230d2d7
SHA1d7c8ccdc18912fce74e553d0cf5b5c55e30667cd
SHA2568a945de1e89c1295d188f68ebfc35d85857fc8f95f3cd9d6260a65b1f182648e
SHA512ab5c9ff5c3e0b0421733823c5bf5970b3ca8c6b60296397561a1c5177de450ba07aeeabaa1cb26f23e2c2b22317ff4c7f811888b68ca1ad0f4b326691d346f7f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52bcf7980cf0fa76b7f729ed6c7fe4d3c
SHA19c7c44f7ae45c03f035f0d94152d0d85c43affd6
SHA256de5436b88122e5515c5f442fe87cdeb2245c6e44c9f82fa2a5756a7288934f2c
SHA5121044fa4bf04a28724d011f499f2328dcf47cbdc3052d96faa719d8eb186e7849c1c60918fc3f7f99591fea0e76b6aa07f5fb5319a561589b828b10a69c7f08f5