Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
eb1cf39a7ac9614d8363523374cbf42c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb1cf39a7ac9614d8363523374cbf42c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb1cf39a7ac9614d8363523374cbf42c_JaffaCakes118.html
-
Size
19KB
-
MD5
eb1cf39a7ac9614d8363523374cbf42c
-
SHA1
848d3f165b94a631aeb827fa38dd325c2cdadaf6
-
SHA256
c0303b281ed4a919cdeca2038ce48f96d7798392beb51c9cad93b72f2ef36c6c
-
SHA512
9957c927ee715f29fd53a88effd10436217d327c75624e8b5232cbe4da8869624c524adfafcc8429d0b7b209728013970fe3ce6dc1c1c3bbce26a0458ea8b790
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIA40zUnjBh0O82qDB8:SIMd0I5nvHJsv09xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5304 msedge.exe 5304 msedge.exe 1148 msedge.exe 1148 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2948 1148 msedge.exe 82 PID 1148 wrote to memory of 2948 1148 msedge.exe 82 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 3592 1148 msedge.exe 83 PID 1148 wrote to memory of 5304 1148 msedge.exe 84 PID 1148 wrote to memory of 5304 1148 msedge.exe 84 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85 PID 1148 wrote to memory of 4632 1148 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb1cf39a7ac9614d8363523374cbf42c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa10646f8,0x7ffaa1064708,0x7ffaa10647182⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,11469321133388041940,1012599409673146037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,11469321133388041940,1012599409673146037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,11469321133388041940,1012599409673146037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11469321133388041940,1012599409673146037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11469321133388041940,1012599409673146037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,11469321133388041940,1012599409673146037,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\92de5dbe-c909-496f-9efe-2b1936cbdf8a.tmp
Filesize6KB
MD5ee45a6100a63bfcb47e7aeebcc6a4944
SHA1dcfadf6db49aeb57c78e1a8041679b6aec289df8
SHA256bd74ea7101160156bd07ca636764e1619fbfb0e9e645a621683ca4c50da6f1a3
SHA5124a1dc2426020df5da8b954cbacbbb9feed02c47c20d55cb19555b92238dd76b6f140c4bbdcf7c56fc68f1df2b10ab984f8b3b5f051d4cb7b20ccd6053960bd9b
-
Filesize
5KB
MD56e0b9b49895487972e3e715d690f12c1
SHA1d97413a06f43f94f4b1cdf9232a3b9e934428ce5
SHA256e9ecf7e869216535bac5f00174e5c56a3348704b487154b441ffa7af8061464f
SHA512852fb5b97a8213e389b7b395a08c90dda32c9e03311f1aafa419323d7fff86c6a8e6e55e28f0c5a6294b797c617c006a22cebfc69c82988f89702b593075139f
-
Filesize
6KB
MD56c9b2d99992ab28b4202bf841a24bd3e
SHA1924983b2ff6d845e346af344c84d84c35e7892f8
SHA25638f3b75d3127d8af7c1bf48716f8a9f9287cca9eaaa4152041b69398c8e30b56
SHA5129d3c1115004b4695181f33e8828d9737bf2e0efd102602710c8bfcd61f543dc95c5d66e001d78ae4f2527a8b82a8a26c24d87eaca2236aaf6712df5837aebc1c
-
Filesize
10KB
MD58076bddc111bc01f3308f1e4b8f99f34
SHA1d4e48c7f1e1461b3f35be20ef8db6750b7d65ee8
SHA256804123554da53c9aa8768e29d8c0c5dfa86ac9c1ad69684ff686e50602dc5825
SHA5122b7acfca3b053f7d21623651df4017d8dfbb536577cc53032efecd9bc68f67f72c859fa7f566c3621c315fdfd80d9696a93db51f03c2f38f809ea6819b350d49