Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
ec0cd0f663c9e86285b2e04bee50a5dc_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ec0cd0f663c9e86285b2e04bee50a5dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ec0cd0f663c9e86285b2e04bee50a5dc_JaffaCakes118.html
-
Size
2KB
-
MD5
ec0cd0f663c9e86285b2e04bee50a5dc
-
SHA1
d9949201d343a1bfc49c42cc4eb9c39c609f32b4
-
SHA256
9cce68dffa3dd39dfb049b621e0101a7d37ff8283d72d3e9480367221d88dca8
-
SHA512
3580a98bf08e0e6c480808f8497b56c81ce6c8da10ecafc49c208bf71f191a2216a81cf8699f54687be446d1c425f884913ba41af38a9a657381c9f1de57232c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 3720 msedge.exe 3720 msedge.exe 316 identity_helper.exe 316 identity_helper.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4744 3720 msedge.exe 82 PID 3720 wrote to memory of 4744 3720 msedge.exe 82 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 2140 3720 msedge.exe 83 PID 3720 wrote to memory of 4536 3720 msedge.exe 84 PID 3720 wrote to memory of 4536 3720 msedge.exe 84 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85 PID 3720 wrote to memory of 4776 3720 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ec0cd0f663c9e86285b2e04bee50a5dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6c0f46f8,0x7fff6c0f4708,0x7fff6c0f47182⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5681441884633396150,7021429888298243796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5ea4afac9184281ac7f200f50ec1448ea
SHA115d9269416bf72b7c9784a6579e05418f844a39c
SHA256c786676dfa9b8b7e3d684c1f9e60d6ea888e35dc3bd6dd7fa8f494f43d0c45ca
SHA512eb19323f1f046950eb01186f2f0c56745f6f37e9e26ba11ddae9ab3bd72a05eaf1c9ea9da430f907fd233f8ec060c9e79aefe72c5104a1cc6a3da560939b030d
-
Filesize
6KB
MD5c7e4573b6fffafa1438f274cdb23e66d
SHA15838d1d8bd5f7de3f198fce6b322eecebf243e9b
SHA256fad35f4240e30f2bf755736456302df985898c426c2a00fc01b10993a51e7f7c
SHA5123e306d60b432f4444b8de7aac62cb8b5ff3ff165a9244071d6c7e8f23e068dbe735d8ac046172a1e24dedf61d00285d4fb6199e6b79ede5eef69e0d9535ac978
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5fe8b3f8b0c0128eeb863cbb5f6427ae5
SHA1d4fd1c77012f021f157727f36048739078d80385
SHA2569aa7b1af8ef28178d8a44744af968fcaef193b14b29b1dc7f69da4c971d3ed12
SHA512993a3fd7da965f152e18bd1a9f67526ec7a05da548fe3429826f3ac35681bd79feeacb9818bb21f77e9b43162cf334c4204073760a3312e76901684a220beb25