Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
eacfb884b4ea195dd0a22fcef5f3ac84_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacfb884b4ea195dd0a22fcef5f3ac84_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacfb884b4ea195dd0a22fcef5f3ac84_JaffaCakes118.html
-
Size
44KB
-
MD5
eacfb884b4ea195dd0a22fcef5f3ac84
-
SHA1
49efc9ffd37b15b7d659fbb76f35b9d00ee96a8b
-
SHA256
780f5a92b1aa412569089111ed6acad0c086b3f146cde76d907087976d85b925
-
SHA512
bb8e55b0162cf0167dd9ef7e82fc3880b061c27e660a48d75dc0da3e2e73d5284ff9e53f074fbe54c516e70c0020ff28dae355a5bd8b506687553f6e5e513950
-
SSDEEP
768:IWgmO0WeDFvprDjIe94kadOpM3tfcvIp2f5wBCHFiFIS:IWgmO0WeDFvprDjI5DIO5AIp2f5wBMiN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 1248 msedge.exe 1248 msedge.exe 1820 identity_helper.exe 1820 identity_helper.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4920 1248 msedge.exe 82 PID 1248 wrote to memory of 4920 1248 msedge.exe 82 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 1900 1248 msedge.exe 83 PID 1248 wrote to memory of 2864 1248 msedge.exe 84 PID 1248 wrote to memory of 2864 1248 msedge.exe 84 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85 PID 1248 wrote to memory of 2420 1248 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eacfb884b4ea195dd0a22fcef5f3ac84_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff815d46f8,0x7fff815d4708,0x7fff815d47182⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8120027222692689782,13317673658483683348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
186B
MD5d9fa6c027168cc017d696720f4236fe2
SHA122aa206dfea671e7b654d8a5d33377241177c07f
SHA25610fd79a2cba83a8d0b19860549436e5c1376168fbeb97f004967284eed007a85
SHA512da637b96c468dd58b351079888b1a9c9d49c51ce70097150c84217dec916f8fbab9efe5f6eab09a5a2c99190868916babbd112bb14e083dc2785b2f00d5d47e8
-
Filesize
5KB
MD52a74a1522a269e760d3f8d255645d9fa
SHA1abd49396f4c45790c94cabc68d43ceb0e5a0e478
SHA2567a4f39f280ec05123a9a3fd4f370a4832b904559c5557e68b6eafbd3b90f67fb
SHA512c65a0234cb34ce4850e3041493b1711d648af4fe10a1fbde259332ec2facc503218569dec70bf8a7e0956cb95f0912710732c1f9f76c4d8ddf4bbdb729221553
-
Filesize
6KB
MD524f94ce9f1bee98004b89f61b255636d
SHA1008faa8a05abb736b5643fe2429fa9148ebd9cb8
SHA256e74a92359366186e9471313f1f017f370c1b6024d013118b22101691d9d8542c
SHA512a0bc49554a2c7ecff31a47691793d31964c1f54515510ccdf3e5d93fcca41ad76526a5365b6eba60f12f2ebb8a98acc141208083518d19c4ba7a181eeb305b4c
-
Filesize
6KB
MD5a65826b9c612bb429638e5089c59d25c
SHA15264cc88612206d732a919ac555677ec348d8622
SHA256797b5c14b7353153493366386a44e44bd02cd77565fcdb5c73fee50e6fcb7d0b
SHA5127839d99899efb1f26ad33fe39952dfab813e00c3c303d7a8c6faa2956f376a4432506b0997c2ce63256f911d5842f70b929b19b8fed550148d37c2967d09cdfe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e531a42f291d8369b5530f5ffebffca6
SHA14bd7ab67b8a5bdbffd443ee90810cb73d3719756
SHA25626b18987ea8d8a9b299a0191ccfb1d134da40a303f27850deae48593c12307b7
SHA512ece7b1b2ab14d1888659e330611e156256a0d6e03d304abf6b17b47546b41cb1db6710c15285c2301362cd9cf451190cd13c9b4c0660787f247364c636d4b24b