Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
ee98ac689ebd723abaedb3c4e199f6fc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee98ac689ebd723abaedb3c4e199f6fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee98ac689ebd723abaedb3c4e199f6fc_JaffaCakes118.html
-
Size
325KB
-
MD5
ee98ac689ebd723abaedb3c4e199f6fc
-
SHA1
ecfeb0af284e192b316dadc3cffc35fa7e922d4f
-
SHA256
d7eb30be37cebd10d17df93d5a9c71d93ded85319e65bb6ccb9b29739f761fde
-
SHA512
44a6708d15f1f80bbe3a9fdb833a904589e52fa703a6a850802dbc8b29c5b2d62d558c1e4e45de5dcb328c17ed6e74fc599ff4c2e04130768337b849f6f5e3df
-
SSDEEP
3072:Y/8JPaXdkqxqd85j6JwawzJKIR2VAKpYtAgOlMccGxCARBGdCm+8dCrh2T8uWMR7:649u2qZZL8Nck8Eh2o0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 916 msedge.exe 916 msedge.exe 3516 identity_helper.exe 3516 identity_helper.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 4204 916 msedge.exe 82 PID 916 wrote to memory of 4204 916 msedge.exe 82 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 232 916 msedge.exe 83 PID 916 wrote to memory of 2868 916 msedge.exe 84 PID 916 wrote to memory of 2868 916 msedge.exe 84 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85 PID 916 wrote to memory of 2172 916 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ee98ac689ebd723abaedb3c4e199f6fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7d1746f8,0x7fff7d174708,0x7fff7d1747182⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11202391482754450561,9266955944859647273,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
955B
MD5296569970fe164d75daf5dc9187009fc
SHA1d5fa3e8ce0509b7a98a80d47208f96f1d80713bd
SHA2563776cd642595c3adc8390f0840f7918100653abdec269d6ac1575465e3b06b54
SHA512a1959471e10482acf9be7291cd734828c8047d417c41d6565b10ab849dbcb986d4242824b8f72f23f869e4b585f050aaa0dedfc6342a90215a3a2aab44b1d5f3
-
Filesize
5KB
MD50635487b0dd190fb25855d64e1ca7d55
SHA1a621ba4efdf33b0d5f5e62ffdea7cebe146a2f8b
SHA2562ae53ae793ac8b8eabd5228a2fb038e2a8333edf310a82e73f2590dd2fe96095
SHA512261d337852376e493b527802e4df5df5a65b5c6ab71d46c06f7830ddae582a52232501c7d4037d83737b8a54ae86eb94d46f4a8970bdf545829c765066e5d127
-
Filesize
6KB
MD52531e8ffce4aaad797dd5d18c295d7a8
SHA1ccdf7f7ecabe8db7623b2c574e008e561f90598a
SHA2560c4b2c1060762edc78eb7ed501ce2167852b4f8efc1f1c381e4b43ee1411adce
SHA51237fe08eaaecbb96bf0ca25bdf4a65af8bf2a0c7a2fd067fdaaf6110a1d5aadb6e2d65cd51941fb5e0f8763e20220c0f7130caa9157a8ff7370e0485684c26394
-
Filesize
538B
MD5f0d975df4b2889bf6a824c3d6eb14202
SHA1987af0674f18cfe2358eccbc95d74255c71f736c
SHA256f3ba109dadadb4a527eac9cf13b71d7c0576d32f20c54aa07ea0793333715596
SHA512694f701d171090b782097e71d349a4d524d4efb271d3856f8461a5f7b101e2fb657a211bd295f952e1291fd79187667872c7888a38e52fda62dd55d5379cdfc9
-
Filesize
538B
MD5aac64c88dbb393649486de3e248141bf
SHA146279d9675289785498d495df4b11c4108051aa8
SHA256486921ebdf5a3e97638bac92cbafbea692a21bf589c8bc7edfe390b51057a09c
SHA512aa8c21712816c451a73d415ce6d6c89a0d0bb40ce2b44a44cd83f24ae337c566f0abc56036d4148b142c6753072c43476ceda2e20af0bd80c378c6e1458984d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f4b90046fbba68fbb968660a174d6f13
SHA1c48be066dd30bc083ebb0bb52ac09d989614f18d
SHA256213e05990f314612720d800179680c52817575f546e7af1038ad38048334050d
SHA5124a08b1668d77e6ef730c7909622fd1a71aa80c46639a12c06267cc100dd61d8841a68d4fbe095520a360faa3ba39215e22156701a5acc43cd4c4e3910662f7b8