Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html
-
Size
51KB
-
MD5
ebc77d79161083ae402bc44b67c87dfb
-
SHA1
9e41330b11064ffd290061a22e566d2541c60fb7
-
SHA256
b4410601229465e1dc03162aad80514871f2f3475ea0f50cb59df19a41ce380b
-
SHA512
1bb33796e0c24d6b7f523fa22325d81af58e9210fa166f12248d0784e808090085738d10c8a8a49d9cc75ada1163a33753c93abdbdb5a384d556001580cc2bed
-
SSDEEP
768:9uiY7GgqL8lJUxqKAIxrY6aSsGmK6mW632tLWapmT6JNqP6h:kGgqL8lJUXhxmHKDExqPW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3308 msedge.exe 3308 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 828 3308 msedge.exe 84 PID 3308 wrote to memory of 828 3308 msedge.exe 84 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 2984 3308 msedge.exe 85 PID 3308 wrote to memory of 3476 3308 msedge.exe 86 PID 3308 wrote to memory of 3476 3308 msedge.exe 86 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87 PID 3308 wrote to memory of 2008 3308 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0bef46f8,0x7ffc0bef4708,0x7ffc0bef47182⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3370259942868930327,2954500594451421385,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3370259942868930327,2954500594451421385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3370259942868930327,2954500594451421385,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3370259942868930327,2954500594451421385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3370259942868930327,2954500594451421385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3370259942868930327,2954500594451421385,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
248B
MD57bb710bb12f8c97ad93bd0e573fb964f
SHA113e9bb6f41b046295246ea84e84d849f2df69156
SHA256d881e9ae1ff10d056df8065ff5f1c5225584cf6df07df562dcc98fe911bf6768
SHA512fe6118546ab6f6b37016aa75fedbd93677735d381367a893ff4dc3416410a60b656e9f325d7e320c77b1ad9f45ad0ffe36deaaeac3bb076c0a971f1b1e7b79f2
-
Filesize
5KB
MD55f4670a8f74bd8c732f93a9b54720a6a
SHA15f6f4215fee8442167afff117293590ae49aa72f
SHA25673011d77587c35965970e81b70e22860e5e4cea50b29c6fba855b23154491425
SHA512516451c39788e50394a94e1eb5aed56eb09dfd724444f8c4c99925a17dccfe54f6fef6dbdf24611148d1a88ff4d709acbdfdd16d6766c8c3c3484d50c8407b3c
-
Filesize
6KB
MD5e6a1fc0bb28adc28e07eba995d4f674a
SHA1adaee8bc01b8215c7039ed8d964d09317a149599
SHA256035fcdbfb5ad000e2b429216d3d88c3139a825d8b0221978887efcabcc9d41eb
SHA512910f8c7ca62db974b7bb1a54b2409fe8ff5d31d6f7089feb4317bf770c0ec8335e019c9e0b4dfbfdffc55dfad2cf4e6a2baf30a11b8ed72e65c9bf631394d0ae
-
Filesize
6KB
MD5200f7e90afd228164b23b1a664e14bfe
SHA19cac824e2f218163b83ead415bbfdc815c8c4eea
SHA2563b4fbdc3b9ac6020bb5ac7d7a9ef2e7431f22c4c23a2caddae0b4fb287f1e3d4
SHA51289850312aeb0f4e0c6aa78aceaeaa307f914329c63c8e7381bb651e9563eff4ae5c4be182838885c57bafe7d7ae8a40a5416aadd12751a467efe1cf5db156863
-
Filesize
369B
MD595a0d4e56d55d39cb59e6e2ecd186eed
SHA1f79c3e64a5af3cf58c0df8c36eb730e011046143
SHA25622a8d16cd75b39e39f079d3f20e788fb2b1df998b97a0e4b159e453a82afe3a8
SHA512a1894ceebfc50b93fc17572bbdb8cfe1508e5a605cc68bad380a098dc9bdebd7fe0a0012a969b261c23b02004680d25e35dbe4c620f20728e1d75dc164765a42
-
Filesize
201B
MD5de80292995cd5590de2fb085f1ed32ce
SHA12f46112710f538c86e3769820de2d67373fdb1c9
SHA2561118ce53e06dd5d9fd16ef1d64f2ffb804da86881a656c337bd6cfc9772bfa78
SHA5126be093ce569508e663c629098d23cecd29a8f0822fef3317a27f83abc859f9d67bcc8aff5d5347890344c63e576f67697e401cead25b47f031283bbef3a2b787
-
Filesize
10KB
MD5d29dd5b6e8e399764a1a0647ffdbb328
SHA1d66e139e314d59163e2853b7cbae9658c1b99ae4
SHA25651de3c35c64f497897f458ff99eb291ec81d1f36aa07ca61d196ab6ff4385df7
SHA5129bb30b7716c642bad861422dff6e13ab8648feea09d2e44d0267498879e98db63876de28006192ed53c6395f4dcfc65a3739891ed1a41986cef73e58f17c7bcc