Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
ee7cba65b473d5743c582abd71cf84ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee7cba65b473d5743c582abd71cf84ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee7cba65b473d5743c582abd71cf84ca_JaffaCakes118.html
-
Size
43KB
-
MD5
ee7cba65b473d5743c582abd71cf84ca
-
SHA1
f7387c51c49cc0d73e516fe56ba40a7f86d0c96f
-
SHA256
febbfc0d48938fe326b342f09d3474c253b0cb1fb18a1e3f9439ea769a85c70f
-
SHA512
feff62c817390b5d428ee83b4959dc3424be0cb944b11342e41ac4ea7d39c7b37e4b97129df58fa737d161dfa76bf4233a99e8c947fe4495edf51fb2af830d89
-
SSDEEP
768:LHL4pTEExBbQTpglYnQfbSkoJPEwP7lrRRvXz3CXdaxfUf1s0HxZk1M:LEphxBbQCl/fbSkoJPEwL1M
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 4556 msedge.exe 4556 msedge.exe 1664 identity_helper.exe 1664 identity_helper.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3960 4556 msedge.exe 82 PID 4556 wrote to memory of 3960 4556 msedge.exe 82 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 908 4556 msedge.exe 83 PID 4556 wrote to memory of 5092 4556 msedge.exe 84 PID 4556 wrote to memory of 5092 4556 msedge.exe 84 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85 PID 4556 wrote to memory of 3668 4556 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ee7cba65b473d5743c582abd71cf84ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8aded46f8,0x7ff8aded4708,0x7ff8aded47182⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12970802937186995453,1581891518867373816,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
2KB
MD529921805d0dbbaa63042cbbb572ca507
SHA1b7411b2a2bef4a195f5270997802458b60f0e7bf
SHA25655fb4225af50c9a85f7e07f178c4068af805a5fd709b660ff869a5716be35ee0
SHA512eba27163baa4c58a4d5df3df659207752d09e129de8cdd9d1d1e99f1bcf72196e85b0e55d57ea57e6d8e6007ab5a6ef9a79b9b4f3418ae289c215bc15b775379
-
Filesize
5KB
MD5d9d44dacecd861ad76e13cc2c06f2bf5
SHA1e086efdc8f8ff6615b4e27298e1bd468c842fe8c
SHA25655610349c90352e0eaf8b0c75c09c79aa5f99b1ce7defa1bf1bbd8a85f11ac2b
SHA51240e237576f24c30be4261ed4db70ca5ac8c233d2dfe2a8e65343e24133162c0ef233ea6ebfb9640462f1e4a995b9c6bc017f0b6d54510df911990d8aadfeb38c
-
Filesize
6KB
MD5056c50c06c1ea2426d1a53820dd83c2f
SHA1c6ea6538cb20ab3b0d6485121bd28134aef91703
SHA2566f411bde4c99366d38492743970a4250a8c12bbe3a496eea09e471e1d4765c21
SHA512e04c3e7a660afe3f8d3c3854a89b27882e775a157647ebf59568b589ccd6140fa63b25b386248cc910ffc2c665569e1d40cd164b94b1fe7e223b9ead8c5ca3ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5874d69d48bb553e6ffb8ae65c847182c
SHA1aab02eca8b549893590b087d943a13449ce6b34f
SHA2565b3a318cddb2c48c47cf132b19fc0192b7a7422a5a18674cd477122430db3c35
SHA512ba0b544de0c66279448298db13be208c7396c0929c3a7c13033ab41021a08f96c71daa2cbec088f205a303f9fb9c6a527d483671aac055689c39a25c3e5908a6