Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
eaed85ad8a0fecf117ace498a108ae17_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaed85ad8a0fecf117ace498a108ae17_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaed85ad8a0fecf117ace498a108ae17_JaffaCakes118.html
-
Size
57KB
-
MD5
eaed85ad8a0fecf117ace498a108ae17
-
SHA1
5126c85e40c77fd2496f2f17bd313342a0387d8c
-
SHA256
1751967d5e8b16dbdbd0e2a6d78087c07dd0a121deb1d3626f5e891f53c8add9
-
SHA512
d6817ae516b8d5479b1576b7b827c1f8ebfec868de5e1269a7727d018dd3cc86200225416402f69e4150939ceb03520b41eea46411974e2b4ea6bb3a484bccc7
-
SSDEEP
1536:gQZBCCOdV0IxCFWbsB41qxxF9bUt0B7xJnvQ3bFnFyQqg8nsW9YW5zVtkAVFGQsJ:gk2f0IxXsB41qxxF9bUtw7xJnvQ3bFnd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 4316 msedge.exe 4316 msedge.exe 2344 identity_helper.exe 2344 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4984 4316 msedge.exe 82 PID 4316 wrote to memory of 4984 4316 msedge.exe 82 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2928 4316 msedge.exe 83 PID 4316 wrote to memory of 2176 4316 msedge.exe 84 PID 4316 wrote to memory of 2176 4316 msedge.exe 84 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85 PID 4316 wrote to memory of 2584 4316 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaed85ad8a0fecf117ace498a108ae17_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa50b46f8,0x7fffa50b4708,0x7fffa50b47182⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13818306289980474640,2312423097713295108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5524 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5c80a563667c357ef9e5cfabc28b931bd
SHA1ea740cabac6d3d1cb52df9385bdb17c8fc3885aa
SHA2561e9358b84f42c337a028c09d2c22594ad4cbfbf192ae463d302a1f5a3e827d85
SHA512b9253ed676eabdb2d947e107d2e13327e3c075acc3a357c33175f4eb492fcfef98596c39865a509d67640806f17c21fb88445716a7aff2cd55a414e7ce8fd82e
-
Filesize
1KB
MD5ebe6fc83df197d9c444db71fde718960
SHA198ca8be7ec136ef2286173bfdece2adb84f66880
SHA256a97ac23a36ceec5e9e1d0b22267efc18309e8940aec7ad52a3174c0d55138147
SHA512dbe023d5c25df264a3a3751807aab4afd607c3b09200eb68754d05a14e2176d3843f1acae8135c680aec41f14f5f2c12e81b5e2e448f85dec5f619c746eb63ec
-
Filesize
5KB
MD565fdde1d6ff01af0e4495b7086685033
SHA137652e194240103e1ea0fc0ef45d93989a81c6ae
SHA256afcc03ca084ef750a59a244e75f26f7442929eddaca589c4b9674d7a6927fd5f
SHA51292f5cefb663b6294a35ce4f12aa03dd750136c98eba96502a14ec997b661545be31141d129a8669d0da898648ff78e70ab92e3c02b1bc3a68e35008a35516bcd
-
Filesize
6KB
MD5ae1a4ceb05594fccc7d335c99b3817f9
SHA1aed07468283aecaeeb47187be837b8d65e0281b2
SHA256da335019ccc7cc496e22c22889b68c0a639815c2c7c5b83083097caeb14c9c2d
SHA512595a4044d83d7b4e4f61921564857675fba63b438521e97c87382d1325b4d0b77d01f8f29043452a8429864fef282614dc7ad5f6fbb45f5895561487470f30c7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5563f9988284ffe82fa68147534a602dc
SHA1686c58af24c5bfde664ee99e01f70e1a5721651f
SHA256eb0ed398a86f797683acc576525bca0e0010e1aa67f2bad3462594ab6b14c193
SHA5121009f08584ffc1e4eb1f2892c140994c29c51c347fcb6073ad44cdb920553f10a4cd10e99854002a5687261a8fb664914d94c802c95a0bf31832552f1ff4eb1b