Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
eb7ab8986df9e9864ec25a81c4de7a06_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb7ab8986df9e9864ec25a81c4de7a06_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb7ab8986df9e9864ec25a81c4de7a06_JaffaCakes118.html
-
Size
70KB
-
MD5
eb7ab8986df9e9864ec25a81c4de7a06
-
SHA1
13a0b95586b1f0d2d19c2d3abd247d106d5b7b4f
-
SHA256
1f68878776b23ef1cfb5023b4026616cedab85ca061d59a3e0d252dbe20605e0
-
SHA512
41ab02fb1955cf0761b43532468335a30b251d255196fb52ad13615ce1d054a30e6fed36fdbd7599f77e5c4f761cb2cdfd062d69b3bd5bd619255264c1b3fc21
-
SSDEEP
768:JicgcMiR3sI2PDDnX0g6sg6Wpph+GroTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JS7TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3132 msedge.exe 3132 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 2928 3132 msedge.exe 82 PID 3132 wrote to memory of 2928 3132 msedge.exe 82 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 2896 3132 msedge.exe 83 PID 3132 wrote to memory of 3792 3132 msedge.exe 84 PID 3132 wrote to memory of 3792 3132 msedge.exe 84 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85 PID 3132 wrote to memory of 4812 3132 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb7ab8986df9e9864ec25a81c4de7a06_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd790346f8,0x7ffd79034708,0x7ffd790347182⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10887585367733566097,6957593718863285712,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD568058722ee3b5b9e64b0b8b6a5a19d17
SHA123ab21b8897fca354965a90f1b12437dfc296216
SHA256e83f9c60b658dee9a82466303b08b80ed1610607133b0eddee44a91d03f50dd5
SHA512f5e59d98accef61ea28164ac8359caacbc1432e0523c14f324af8c2993743f722d4d4c93116078e5a8a0bfa6f4b946a5495e7352a64864e26e9fdfb0e37937b2
-
Filesize
6KB
MD52cbb47dee039ce229dd7c9ad82d309b3
SHA14cc1ecf60040b10d85e979625b6800c24ed6f552
SHA2560cef228d0c8f94e651a0fda77469014eb684adc94fb629c4f5b744263b470cfc
SHA51283cbfc26e5bee57094b4b41b6e10d826f85ebc19aa56a46084ae75c93746cdec2cf8512a0f9ec9660e74a44a76bfbf6df7bbd9685d93a4f2196c5685c76bc69c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dd5010188f0782f0e09045167136a22b
SHA15547fbb631c91bcc38fe7f77e5d4ba39691f3ac1
SHA256e553282412cab2e224d9d643fee40939e0620035e287812de2d2b24bca7bf6fc
SHA51254542038c8367fb4e6f037652f8734a4c720e23b40ac6540260129a4bce27834ccb799520cd5eac5a005d34a5c4604aa7d5ff0badc510104391174a86bfd85d7