Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
eb145dcd61adc81a1da678b27a219036_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb145dcd61adc81a1da678b27a219036_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb145dcd61adc81a1da678b27a219036_JaffaCakes118.html
-
Size
45KB
-
MD5
eb145dcd61adc81a1da678b27a219036
-
SHA1
4ae8e30318affc24d3aa703d4467de9c2dbddf2b
-
SHA256
d7bc7fab70daec5954bfbf21b4dc53c920ef05669fe81a113352f5859c44b160
-
SHA512
ac1f60b72feeb7fa8aeadd711ef2fc904a46cc4eb157f5c521893b2c7c1be8a6f78baad6706e2cc5538faa218be1d486b28b49f901f248a786642670c90fd190
-
SSDEEP
768:a4Owaw+H/3XxeBCWA9yEvwTy+1cRzK0Eb00qwSGMJpchha:a4sw+HZFjv/40DSSGMJpchY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 444 msedge.exe 444 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 444 msedge.exe 444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 444 wrote to memory of 1084 444 msedge.exe 82 PID 444 wrote to memory of 1084 444 msedge.exe 82 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 60 444 msedge.exe 83 PID 444 wrote to memory of 4444 444 msedge.exe 84 PID 444 wrote to memory of 4444 444 msedge.exe 84 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85 PID 444 wrote to memory of 4772 444 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb145dcd61adc81a1da678b27a219036_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5b8946f8,0x7fff5b894708,0x7fff5b8947182⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1349101880606414697,12065865062114152998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1349101880606414697,12065865062114152998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1349101880606414697,12065865062114152998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1349101880606414697,12065865062114152998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1349101880606414697,12065865062114152998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1349101880606414697,12065865062114152998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD503f38be161d2d39e4a2cbe52dbb83f02
SHA1a30335cecedab48c47f93351091dcd4ec70b1a0d
SHA256df2db21602cb623d10fdf65af6578def68e8c6252288ef691c40568a30e2ae11
SHA512f1fb426531bd204b93a9788e7aa163b73a28e6755f4bc7ff8ae3427269bd3de92fa0442c7cdec23e9ab824a7ecba524d38d9bec7f2908c80e57b97c42200dfa2
-
Filesize
6KB
MD5f31f936f0f70e49932b11cbf2bfd0585
SHA123082b56df793928ed0b327367c4bce57ce5cfc2
SHA256726f1c1e2beb526dc6c55b10e30e902e97d4fcf065efdf04decb5680655b3d72
SHA512732572251ab740fa576a2b6531df002ab50633d26cf4040fb27b05a9b8718d85560332a906041d32e4575e4728fed0fa6760194e3172e8cf447e8e83783ea852
-
Filesize
10KB
MD574ca10088643920626765705d2ebc31f
SHA1bd5e6aec188a2dc9f3765a4a0c70cf16bc4558e2
SHA256ad66e337ac90abbb90672927bbcec9a7ef4ee09f77e701e4e9aada74de000dd3
SHA5123e574d8d77d84f8bffe4acc2d782d92c7deb3a7a11b668ba7b6fcc489fc8e0de2c799e23f23bd616d38d29886015011564e52a201a6f183fe01f9e99dece249f