Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
eb7f7c32e1c5a422f9148554bca28133_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb7f7c32e1c5a422f9148554bca28133_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb7f7c32e1c5a422f9148554bca28133_JaffaCakes118.html
-
Size
238KB
-
MD5
eb7f7c32e1c5a422f9148554bca28133
-
SHA1
97a2eef57ba0e0fea2d5eccf67cca72aec3cc55a
-
SHA256
ea07669ffb0f80a61750978d52d693c3ccb36089923118559883b7fb3cbb0b84
-
SHA512
fc65fe41e0b60f4f6343a679686d32685148a4cc3788a7854e328366ff07829b3eb87f74a44767fbbbe8b2bce36bc1c606a0677579a800897011cd45a316620b
-
SSDEEP
6144:9F5I1IfcBUUo7qN8f+BQs9uPYJarA2/P45KBoraY7ZEuPZPyb9ysy9QB47oekjZ7:Xx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4612 msedge.exe 4612 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4064 4612 msedge.exe 82 PID 4612 wrote to memory of 4064 4612 msedge.exe 82 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 3404 4612 msedge.exe 83 PID 4612 wrote to memory of 4372 4612 msedge.exe 84 PID 4612 wrote to memory of 4372 4612 msedge.exe 84 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85 PID 4612 wrote to memory of 4836 4612 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb7f7c32e1c5a422f9148554bca28133_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffcc66c46f8,0x7ffcc66c4708,0x7ffcc66c47182⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,15251041584274680564,14370750746472722624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
712B
MD5346eee98057a7ae560bc291a42033429
SHA1ad161e7cddc0f013e40b41c21fbfa67582c4c863
SHA2564590545e1480dda04b00706aafeff64d3e0a67b2d9142c1db4a7d2ce62a54efc
SHA512700a5f87cc6a68d68c102d5a9d52c73451709773c6c813457716d6411ccc5baa5e3008f753ea3eb573de8172d358e9eb93776cbd2c7b27da6ff36d90dcbd67b4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5d2fbaf72fa75795106402a1ed310cf0c
SHA1ae3a452e5c97db262a4c0cea15a9b9de77cb69fb
SHA2565b4d19b8e69f30ceca83bc0c7366a247231187b61656007fe5f0df9967ef5636
SHA5126e26f7b06a29d8c655f71f6d214d9b9451ce0467e8982705394cac7286345ecfff16bba97a74c0f06f85e91bb106e3d39348cd2843490b1ae6d5992a833e79c9
-
Filesize
6KB
MD57509f1b62089b0fd5d9e7580bcf54aad
SHA1b3ec3c71f16313c6cd00b72de15bcae61653f726
SHA256d007ee32762327ae1c1245db8c152bd5d14e27236fa207bc08cb08c43a4e73d8
SHA512e12ccaabbe96746e10b95edced71c6cefaab8b29184fd4825406620244a3ee3edda434f10aa3f7028bac7efb3e8520e0a1a5e2640b39532731f839a9be418952
-
Filesize
6KB
MD50b24fdf8c2c7087ee7d81e2795e6654f
SHA19825d2ddd91a39be8686c4470fb6c5f169fcec2b
SHA2566e92b84ba092c1a8114ff947d2cca3373d49ea75cf02d02fcf56897100e133c6
SHA512a4b29fc83bc842248727f8cf72d097eba71b4c9f3461d203f8e21fec92407058627aa4d8d61cc964263a0c65d8859749ab0af60c31d6bac16886ad0c2d010e97
-
Filesize
202B
MD501b172bc45604ff43a83890c41da6f4d
SHA1989f0d9326dde24a6e45ff697cbbd9fdb2ff070b
SHA256383f80156ca381650bcce72b42fc9b71d8dce51abda8157da54f2fb10cb52ebf
SHA512b719c6b6824a0ab6b1dee31171468b3da4df90ec0164f034314ec53b695c1942b3c243aea991c3b14f56b890ac33f758017989b62d1079d68c03079d756c545d
-
Filesize
202B
MD57e70683a372fca61578aa0752bb135aa
SHA1dc5f30f3835ac2f1f81b5e4da546357388424882
SHA2560c8a8d8aa90af64e4498d9ef97cc085d3cff8e46d98c996213c458ce24bc268c
SHA512a4b24bfaf2a50cfc5656b8c56e62b1f6cf105435a55bfb5ff62d7b5c4ebc373528095e1ddafceb92845b55c506e67ed944771aa92dd39fe2936aea3348ba8451
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51eef750a2256e337e01a8721ee595fc2
SHA14738bc4b847d0cb2a3a18e0190159040a08f63cd
SHA256dff0bbcb3770fb398f86704f49160abd7914f3b68066ba3a8c1a303f48f72ff2
SHA5124504666890a7888080cf72dc56b35ff95500a8957d163f59bca283208375c3aae5901204a879a3a997e71190a8dddbff459efdfcb9ff39dd9673aee07ea012f2