Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
eb66d07c2ba3f9533410d26f682b5c67_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb66d07c2ba3f9533410d26f682b5c67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb66d07c2ba3f9533410d26f682b5c67_JaffaCakes118.html
-
Size
57KB
-
MD5
eb66d07c2ba3f9533410d26f682b5c67
-
SHA1
894f1ce57c9dcbf55e4ed72d2a799589c1f8f0d0
-
SHA256
d4f8a056b8eca85698746eb91a19f6d1a869f9463546b06dfec4814ab0c446b4
-
SHA512
c73bc7ab0df57d21b3489ec7041179f5fd5087af1829c01c7b65a64e224f0e18c482ebf3094af4d70db1b9cde7dc44d8ce06168f4e1fd30e600ce83049e831ef
-
SSDEEP
1536:ijEQvK8OPHdsgjo2vgyHJv0owbd6zKD6CDK2RVroLQwpDK2RVy:ijnOPHdsD2vgyHJutDK2RVroLQwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 640 msedge.exe 640 msedge.exe 3260 msedge.exe 3260 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 896 3260 msedge.exe 82 PID 3260 wrote to memory of 896 3260 msedge.exe 82 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 3832 3260 msedge.exe 83 PID 3260 wrote to memory of 640 3260 msedge.exe 84 PID 3260 wrote to memory of 640 3260 msedge.exe 84 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85 PID 3260 wrote to memory of 3836 3260 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb66d07c2ba3f9533410d26f682b5c67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1a4646f8,0x7ffc1a464708,0x7ffc1a4647182⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16605995125512983462,12812693128914190731,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD57c42f863aa0eff8b6779b5e3266775d8
SHA1b01534c9896affa2f25949a17c36a78d6ed35e48
SHA256fbdd429d1b8eed27c7970c784b635653d75dd7b03e9ffab506af4021a9913318
SHA512caff2ed76f8109603eecdd4f2d4cf08db4b94ba28391333aa463e02e04db174e4a5201aa5226e53ddaa5c7c4a353462d93e0f4c379bb2580edcdbfc42d276fd9
-
Filesize
1KB
MD52736d0870a841ef5d53c1dc4586be768
SHA18f503bf79e8b253a15e1d82f9abdc31e1684b19a
SHA25613ff0cb287df57287e91dc62d6059bd910a6ec664341db0e35440c15b5a8482b
SHA512210fee7ec67208b7dab6ec53ba63943bac040e532539928b7995290331146ff1eff9cd42e7446c8bba8e538924596d8c2bb5f42a052e0ad6362db305b171af98
-
Filesize
5KB
MD53cb112249a6c2a807d30a84215498277
SHA16da7fc379475ef384bec1b7aedd1678044f892be
SHA2568acbf825e0431ead2fcdcbccce955a7d3c678d6c43f9051ea2dd60a89727d9c4
SHA512f468e6e11ef824a0f57bef099497eb5cc991077febb5d1fd13d3ccd76a0f752cfa6664e34049be3d1e17d13ef1f4d51b9941a52df44b820b15a8673425be865f
-
Filesize
6KB
MD5c473ead9069e0f82ed2c9f0607c10b8e
SHA12e1c03a9af5ca58e44c0895780683b3278103572
SHA2560839c0d35b2ada2e8cc3fbb8daf9ed91bb495fd3aaedef3fe190147db458a0bc
SHA512ac3a1bd600e54240508d4566571c67921511d8e0159cd9d45b3ad9766eb79b4235fc8ee6f9cbf25b8c1ce933ad5a829c23588f0724232d4a1e2a5a3b8b1aa88d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5292eb2aacce2a0d18bd4d4c6287c7f53
SHA16375363544adf14cd1954be571f91a789506a653
SHA2569d0358bf352872888b816540e17ef88646a1a2516cf82a31af0d24692a5dfada
SHA51217d599bda9e0061d0934bf75ef9521aba850bd38077325a6094635d47b69f0debd7d0c62f9dbc3d7741a0bce244ebc52f56129da5d8fc558c312b055ae6b5616