Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
ee8962cc63943d1d86544e6264136c65_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8962cc63943d1d86544e6264136c65_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee8962cc63943d1d86544e6264136c65_JaffaCakes118.html
-
Size
13KB
-
MD5
ee8962cc63943d1d86544e6264136c65
-
SHA1
9497859f5a0795a8e0093fb796f56527c8e1a526
-
SHA256
d85eeb9ad594a4d64b440e4c57e7c72dcb8f710dce75f80549aa15ffd12f13d9
-
SHA512
0cbce0788944adf4c345f171eb076c199bbf14dc99d75884b6e3066f26507af7989627804ede7d01ff9983ebec6c68b51e5eca37c2a700521bc5dec01a8f91e5
-
SSDEEP
192:fnyhH5jcnzcMgc+SGWf7i+WB61/nTB76781HNAfmTboOAvhTKlmP3KTAL3E2:KDcA2W+WM1/nTJG81HI7OAv0J2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 1376 msedge.exe 1376 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 4292 1376 msedge.exe 82 PID 1376 wrote to memory of 4292 1376 msedge.exe 82 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 3468 1376 msedge.exe 83 PID 1376 wrote to memory of 4300 1376 msedge.exe 84 PID 1376 wrote to memory of 4300 1376 msedge.exe 84 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85 PID 1376 wrote to memory of 3772 1376 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ee8962cc63943d1d86544e6264136c65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed34f46f8,0x7ffed34f4708,0x7ffed34f47182⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8779292450794247135,8324121428972542580,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5e1caeb8461213fa6d1ccc22a316982da
SHA1b9448e45ca8108784a4d94b7d76a1471cff4102b
SHA2560fe8823538f216ec323ce7f89af10857a9c092717de34231ac6c4789f52e1fb7
SHA512bf5d801a99d8a071d51a974cbb45440a69b3967837ae3b47e5146ff0657ba81d2c6e7d959af96d84776a07ab7b01af7e7206f85abb146eb7e840c004161af92a
-
Filesize
1KB
MD50b12fb36e7bb097226a072f96af20542
SHA1d59fc37726b49ff5504922599da369e48b1a4095
SHA256dcbc22c0972de35acb0a1506475af215707249805354b1ed2a3158bc74e21550
SHA512cffd73613cffee40b80381fb752bf6ad9e9f5615e177b9d11ad55208e04636fedfd8e55a959eb1622bd2d6a4524eb5f28e31c958f2e8f21f4e9f7c11a5e415ce
-
Filesize
5KB
MD555bdfd5b4ced320556a976f1d76bcd0a
SHA124274150d83305446768780a5aac0df87eee30c0
SHA25654300ba8ca73bc9578a5d82c7e90fb41e1770868ac9b892964929ee11458cec5
SHA5121bd20370a138948a7990b74c83a120979fbedbe8b40230d1f3df08bdde404b16b6b1ee46119c2c3a7f382a079f69b9f507d7417c2563ea71a3d52051fcae1c76
-
Filesize
6KB
MD5e0712594b23bd7601606e0727f8e10ba
SHA16c11e7084b32b270420f5ba2e11d32f839038db0
SHA25699f7c8426d5757328e7300452b9f62b0aa2d2fdb651711bcf271de18e8e3a53a
SHA5127990aee4284305a72d344e770c930304d716729730510d72e19475b21a93ce1a97ae3b0e930cafe2756d4773245271be875d77ec22af48427318b881e156de4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59366c0bf53164f7afe4b2e98dea8a23c
SHA17f45fb30b4b72ee7f62cbf164ac066d7e1240528
SHA25600633bd64642d5ae2ed101a39275c7c83536c9d30eb821b7bb403c4bc54b3d83
SHA512d755a06a87e099082c3468d2495e46193ea658d5a599a36cd9282834e6cc57a91419841ef393d460df1d19996f4f5927200d96592d365aa0683858c4f5ced458