Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
eb669f5baaae6b2635766a52d925637b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb669f5baaae6b2635766a52d925637b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb669f5baaae6b2635766a52d925637b_JaffaCakes118.html
-
Size
35KB
-
MD5
eb669f5baaae6b2635766a52d925637b
-
SHA1
34ba3032b930e406579b97cb8f999f535727a9c4
-
SHA256
46bb93cd9e1bda0c891d8fab1d33068076fe61dc6fcb5902f4c087c168ce057b
-
SHA512
d5f8ab23ea83a9f34cdd733cb725df4d7c31647ffcd96050111d1f1caa056d1fba2adcb151c9f0ab372913c24ee13ce65a5c7a28c23ea28796d18a5bb3dbbacb
-
SSDEEP
768:zwx/MDTHg688hARUZPXzE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLR/:Q/zbJxNVNu0Sx/P8wK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 5016 msedge.exe 5016 msedge.exe 3576 identity_helper.exe 3576 identity_helper.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4636 5016 msedge.exe 82 PID 5016 wrote to memory of 4636 5016 msedge.exe 82 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 2212 5016 msedge.exe 83 PID 5016 wrote to memory of 4964 5016 msedge.exe 84 PID 5016 wrote to memory of 4964 5016 msedge.exe 84 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85 PID 5016 wrote to memory of 4876 5016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb669f5baaae6b2635766a52d925637b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94f546f8,0x7ffa94f54708,0x7ffa94f547182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,18080964157584450994,2852983918209249435,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
614B
MD5c6395ca1357c5815773feee508f7b584
SHA10b65068260ace971a233d8065ac12e813404a9bc
SHA256fa358b3ddd765ed76866d12d587d736ba9e18a4c5cf9aebfc2433ec38b68df8e
SHA512e554b8bf73280b525a20b19f03c8f6427d0e7a70c9d6e7e6161f28d8101968aa225b5f65ec367300da6ca9075771132892fe35aa33fee536994a35f310ea91b9
-
Filesize
5KB
MD55e676ffd79bcc4479aa841defacf96cb
SHA138360159edcc179af46f66d5af1f7cdc3f083a3c
SHA25634f2dc26a8387a5bae21b39f1b2746da3eff7bbf1f4a8ff9065918f59d340e25
SHA512d58796454088474035b772f6a08a9a99294f33a644fda9eccf75173fd94fab0ba270d01d68cfa6f2253050c7c3b92cc5ede1be9bb24800f14c6954c2190372df
-
Filesize
6KB
MD58aa87714b1f2c5972dde6efe81b95df8
SHA198d69b935e5fb712166784fbbb9bb3244077146e
SHA2563899987ab8845be6e135e7ff669bdc0fbe7d2902c26addfd6ddfcedd28da735a
SHA5128c6a60788a08aaeaa292fd12f2d8b7c668609ce27f19ccead8440dbb0fc0e0df59fabf364f0606521ff18c24f547c548f6e7d333f434354932044bcfa1707802
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b710b04c0e38b00963c7212b68431c0a
SHA14272d1ea4e4adfe27b2dfc67994121a9e08b07d3
SHA256fcb29e63ada582636b45e2b5ab79f91a0b38c38376e8cd3c039949d1ca0a4ef9
SHA5129519c967d973cfe912279d8d70361eebead150ac201ecba2ceb5303444c3f4517f06391b82a28e05455ee97d6017dc6cd17b14f41e15414e3a2d58bce143b1d3