Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
ebe26a7a09c4c63bad72721cbb1154d9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebe26a7a09c4c63bad72721cbb1154d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebe26a7a09c4c63bad72721cbb1154d9_JaffaCakes118.html
-
Size
27KB
-
MD5
ebe26a7a09c4c63bad72721cbb1154d9
-
SHA1
ae8ee9259a73f49d10ead66ac21788c1eb1b78f5
-
SHA256
b9b03341816a81c456ef258dbbc9f705258951774adbf7bae830a120cc0d96cb
-
SHA512
3ccc41d446c3160cc86d9eda5b3e8f5f9b7b2bcd0ddec209bad1e08af04fd8d8d031c928c5fd24390dabce2cf103fddc179d8282b25a0f7aaaade6e11daeb43d
-
SSDEEP
192:uw3Mb5nZSnQjxn5Q/MnQiePNn/nQOkEntAOnQTbnFnQ9ejrm6u/97Ql7MBvqnYnn:IQ/Tm969CS12yf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4944 msedge.exe 4944 msedge.exe 2720 identity_helper.exe 2720 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2232 4944 msedge.exe 82 PID 4944 wrote to memory of 2232 4944 msedge.exe 82 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 3316 4944 msedge.exe 83 PID 4944 wrote to memory of 4580 4944 msedge.exe 84 PID 4944 wrote to memory of 4580 4944 msedge.exe 84 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85 PID 4944 wrote to memory of 5088 4944 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ebe26a7a09c4c63bad72721cbb1154d9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcc5046f8,0x7ffdcc504708,0x7ffdcc5047182⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2856563335308965440,7594930092139508854,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD5ed4c95b63a67ce59109389d556bfd69b
SHA14c753be4e3bc710f0b00bbcc87b6274a654df5bf
SHA256bb23162ae93e797c71da4ec76aa3259ece4ef1c5facc9452d21ab7eae528420b
SHA51236f2202a434796c62cb90bb1d4d480f1022b225e2ce7339f9d635d559487bd53c9df3a3992f6dcd6e2e2c7ee9e3ec2fe5115b5b0a9b68a41b6ee2d368407a7d9
-
Filesize
6KB
MD5b45675c5793eb347c7d9229fe9ae81e2
SHA11ff7c859f2183acb242863a8344d6416f06c5d4b
SHA256c38cf73b2d16c8974bc75b632496929d9a773969c1cebb5df4e58c3e50fe6623
SHA512ac062523f448a28be497bb6747ec74dcfb1d15e19f2275b55d52a1dc84060b1f4426ff2a89653ee5523fb18742c4e34d8d416de8339a9c4d466fb859f2724765
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d8fcde3f4ffa18402b5114b78745f306
SHA16d7de229926f47dd8d133d8a5acf02463dae64c4
SHA256a449b7747ba6f6c4f7c6339b9e4e6b7ba3d3e3b7803cdd04c37aae6a30350cc9
SHA51270e80c079f75b434dcca9b765b6b5f357c37d36ccf9379ec5bd72c76f95204e27d88ed5bc9c66d881aa75f76508dc86e846d3417be9778d771a8ae8534bd7d18