Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
eb005635365707d5151583ab3af2acc7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb005635365707d5151583ab3af2acc7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb005635365707d5151583ab3af2acc7_JaffaCakes118.html
-
Size
121KB
-
MD5
eb005635365707d5151583ab3af2acc7
-
SHA1
350dec83dcb3bc46ca25bb494565e92e1ebe08e9
-
SHA256
39124f224f61d2ecfe80e0720229db37a50a30a90301bd010c44b30c4e1aa081
-
SHA512
5fb9ffb99539129a194fbea66f63ecad1b75b5645b68ce4c8e27cfafc870fc08e76c13d4839ee652df303223b67f40b650e2a2307d58233069b55f740c54819a
-
SSDEEP
1536:gWawZOyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:DLOyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2404 msedge.exe 2404 msedge.exe 3652 msedge.exe 3652 msedge.exe 428 identity_helper.exe 428 identity_helper.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 3332 3652 msedge.exe 81 PID 3652 wrote to memory of 3332 3652 msedge.exe 81 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 3476 3652 msedge.exe 82 PID 3652 wrote to memory of 2404 3652 msedge.exe 83 PID 3652 wrote to memory of 2404 3652 msedge.exe 83 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84 PID 3652 wrote to memory of 4848 3652 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb005635365707d5151583ab3af2acc7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd183e46f8,0x7ffd183e4708,0x7ffd183e47182⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10742207765272162893,5655192256555441887,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD59b239eab68ea1b8b5267917c64ebfea5
SHA1a77a1d8d024052727337ec82fa41a665cd0c9de2
SHA256165e265f376d51f85711ca1623f2dad6b96bb7ef53308eb6277a2930d6c9ac19
SHA512941b3a5283974bfe2f8de417a160373c544fcd8d6ab1800e6b7c00db401c26df6eafc17a379016a9815b20fe91dd53497acf0b1cf964ea09948cf5fe0ee6f1a6
-
Filesize
6KB
MD5f4472f3435368efbbd303c78f5c60a84
SHA1aed2a30f0550ebf38e73805ba85a8bdfc796a225
SHA256fd57ac36e463856759599a99320d3562c6a27b97f8a20399b44c5a17bf6d0031
SHA512cbba35f681fe1476c6ac00733c489b5355fb3cebafd69161e2dc344faa9e8281ad485a1c235f37bbb6312822cd25761c3cdba238cc485f161c26d522f25e3190
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c20ab43d6aa9e4e3de2a13fd6ca84daf
SHA196d38535ef59599d702df65a3f8656ca2f11d526
SHA25675982cc31d102d48f24961bcff64f52d7d841217b5ed8a9ef8dae488f5cbc4e5
SHA512f69d6b52018b09bfd274658f76857fcc20c3c405d85a5597423c88421eb580bdeec0d863862a4684d47ea73793a20ff30cd206505d9cd07fed6562b46d5f5d85