Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
eb693bb57ee57ae3e07f3f2fd0f35fde_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb693bb57ee57ae3e07f3f2fd0f35fde_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb693bb57ee57ae3e07f3f2fd0f35fde_JaffaCakes118.html
-
Size
36KB
-
MD5
eb693bb57ee57ae3e07f3f2fd0f35fde
-
SHA1
09bbd006aa0af057bdc5620c8c739bf70ca311f1
-
SHA256
22f6d3b42c312be436a02b77c78d663fef656e269dc92f9e82cd4ceb78daecca
-
SHA512
a78c7448779679596d80b95c283d10f578b3d2fbc37f7d38058536a35e6328476de0c626aee39d1de0e3512558f0454f5a0541135e0cb2172e37c4d8e06e4ae0
-
SSDEEP
768:zwx/MDTHpx88hAR6ZPXJE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TQZOe6cLV6OxJyy:Q/rbJxNVau6SF/+88K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 544 msedge.exe 544 msedge.exe 4404 msedge.exe 4404 msedge.exe 3884 identity_helper.exe 3884 identity_helper.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3452 4404 msedge.exe 81 PID 4404 wrote to memory of 3452 4404 msedge.exe 81 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 4508 4404 msedge.exe 82 PID 4404 wrote to memory of 544 4404 msedge.exe 83 PID 4404 wrote to memory of 544 4404 msedge.exe 83 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84 PID 4404 wrote to memory of 2264 4404 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb693bb57ee57ae3e07f3f2fd0f35fde_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb579346f8,0x7ffb57934708,0x7ffb579347182⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16449669333058739158,559959478964667621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
613B
MD561afdd542a68c1059ac993471e7e4de7
SHA1348abc677b161d5596ca053ac1fd4bfa697730b5
SHA256644b1042e63878d13b93264fccb84c2cc8d1285988e11101a89d8502e75c2b19
SHA512fb5957c8bd6dac01ae1b800181c82d82556122da8d2c9f2c96999c17ca11ce183fe7bbc07d7a4c73814ee0ed60e7a9911c980c4b629f0a87aaeffe70b9dc6b18
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5a5cb28e04398054de93a1a7f1cefb00f
SHA1e10622c0195ee5bd72ac7528d0a085fdbca10809
SHA2562a8354cdc3bba3f0d863392c45eff30f701b3873eebfc41d0882b5b4b51923ce
SHA512310b9ec2c0db2daacbe6b3059c6d0eddd2d29eafb6fe0769cb1f10037eb9464d91b456551a88baf10ada0daa3b99a049b261636bbe468c19b03aec1912b028ae
-
Filesize
6KB
MD5a7e28ecb35c17d23a09d35bec642c34c
SHA1cb2922bc5d3b6264f095bdcc740ed07e4fb15a5a
SHA2565a1df2ec0310a1207ef2ed61cdc4277822a4e753912ec7ed03e6ca82525dec73
SHA512b4ed81ad5819f88d07bb3fd80715c12153912c38c2ef4fc4355d433d4d027df65da20de21e8459e495fc35247fadfd6050039b6dda8a3d48ad2bac5ea6a583a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c4d29c5ab7a812953fb7dc8f3f39182
SHA1db9ff79d548fe0e73627c910be06ac41dba9a593
SHA256f04fb31883ad1ef6ebcc14ed7f171ea70ea16fe45e6b2b9880108174b5506a0e
SHA5123a3dc3e2590af9999f05a16868f24877b583e99c39a0403536603628aa933529a28fbc4459d5f78c6e716ce11ad6bfec1f7c7b780716f6c3e79330a5e22d3b26