Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
eb9e399a29285d967146aa5f0db061fa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb9e399a29285d967146aa5f0db061fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb9e399a29285d967146aa5f0db061fa_JaffaCakes118.html
-
Size
57KB
-
MD5
eb9e399a29285d967146aa5f0db061fa
-
SHA1
6c0a15b3dc1fe5e1639ba114aac30c4f8e592b46
-
SHA256
16ddfeb1bf9d226d1712fb094fef81fee99256792b013d7c83db3ac288a8c6c0
-
SHA512
28f10f64c546d0bbfaa21b69f388bd9320543cf7c6fb0e607db32878a2383860f2fe9857673b80f17650359c4269b0e1b6bd3acf33bba72fdc4417016fb4df6f
-
SSDEEP
1536:ijEQvK8OPHdVgco2vgyHJv0owbd6zKD6CDK2RVroV/wpDK2RVy:ijnOPHdVC2vgyHJutDK2RVroV/wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 1196 msedge.exe 1196 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 244 1196 msedge.exe 82 PID 1196 wrote to memory of 244 1196 msedge.exe 82 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4080 1196 msedge.exe 83 PID 1196 wrote to memory of 4244 1196 msedge.exe 84 PID 1196 wrote to memory of 4244 1196 msedge.exe 84 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85 PID 1196 wrote to memory of 4900 1196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb9e399a29285d967146aa5f0db061fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff381446f8,0x7fff38144708,0x7fff381447182⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3028 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3501592992114268250,14653281615813413432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5ea83bc60f3683b1fdb367feb2c3a96bb
SHA12d4459a0c772ca37b5fc74632b280752d194b030
SHA25643ac8b3ba651e8e0180226a0514587f968c70b4adfcb4fa65d190f93602d2e37
SHA5126890e747405cca6004170e3a397799125a6fd84cafe7584bb04a0167212e7ecfe019500fc8a80ff513762099a9e6a442c07b088d3957d3c3d7ed63f010445700
-
Filesize
1KB
MD552c2f339f3b382399ab30b81d831c822
SHA1cdb4e76ec68661aff353a45599856b47dff31439
SHA25670140b6661ab46d093bc3a2da3b6a0f2bd142e0139e9cf068f607b17093594b0
SHA5125427cac92b7860dea8190834d353368103b65dd19c194e53466573cd82fdccfcaac24072974971d795ed054e3436b076232ae5bfa153b57581bd882ac4aa9f3e
-
Filesize
6KB
MD5e719ba3128ec6fe65aa443074d4faa9a
SHA16edb387b6f5f34ad77bed170d30aca739e26928e
SHA2563a8b5d3f32666b3fac9aec205d07cec8356899975afe418e435dca40bbaaf664
SHA512332d416e1c98807feb486be38e82fad26b3d2b6bcc44652d19c2c2a60355c4d61925adde5f8d45f561fc1201c4f8032c1cb1e9dfbc4ee5dd1351b92720d21cec
-
Filesize
5KB
MD5a02380f96691e55897006f6b72d82012
SHA100b76f02e35dbd7ccec24f0efc63feeb8b39936c
SHA2564393e35354e32e1da19b658b61cdeda23208b8c942563b5a66b2e2d591373677
SHA5124c3da42e5c6de11396893199b4f252bf8a7faf8819bf186f2ec0245bc4f0422c9b535c770629945ff1b75b88c96d6fb0618c5fe428d8602cc32027ce018f0560
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c01bba8b46b23dee5668c15e135796de
SHA1db9d92d5f65c582b7afc36561aea0fb75e51af8a
SHA25603215c55db73c6f0a8071f4d0c281c747eb2045adfac1abb688273d4ac09d48a
SHA512e490762f1e408ec6c5dd03bf0db462b0ab68ac8c253a2046eec6c2e44691d8ba012a068847448a56211cc5ef13851008a22dcf4a113f6ad3147c54abf3482ce8