Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html
-
Size
4KB
-
MD5
eebc0a8c44234d62d8bf1d4b7d657053
-
SHA1
fa0974df64fcef7b100768a2714e1ab69e6403af
-
SHA256
fd79c62aef3e1959624ade3226b1aef14b8c7b2b07ee179dc677cce399393aaa
-
SHA512
5997df9d4a5111a995db1199709369b2f71054fc303c94c723ca947f3911c2f7a90bc56ff68d8c8468c05191da2527c6123009d2ccf4c53e6ccad9711f127999
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oScvIjLd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 3724 msedge.exe 3724 msedge.exe 380 identity_helper.exe 380 identity_helper.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 1452 3724 msedge.exe 82 PID 3724 wrote to memory of 1452 3724 msedge.exe 82 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 3032 3724 msedge.exe 83 PID 3724 wrote to memory of 4444 3724 msedge.exe 84 PID 3724 wrote to memory of 4444 3724 msedge.exe 84 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85 PID 3724 wrote to memory of 2792 3724 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b5d46f8,0x7ffa8b5d4708,0x7ffa8b5d47182⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1464 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,1883575080501552859,17323416604452651232,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
292B
MD509ab5d4eab84dfd5790431c5f0169571
SHA1de8851a68c19157d7cccc819e413d5312e4ea6ee
SHA25671762067722a2f02d692e7a4fffa6b32a13a7a13cecf0b8e9724bf1a71b5418b
SHA512789eb995bcccf51aaf278136377624fcee18f046823e600d09205478b1538827e861d1fd516dd042b6c8f605516fa30b6e170521c5fd0dbbf3cdd01368ec97b5
-
Filesize
5KB
MD579445890ed1455407a6eb6d1e3330467
SHA1b5b8ffd2219bffdbc61af6aa7afccacaf5350752
SHA2568e9e74c407b27d94bdbf0ef9ff6dae143ec7e29f4f6242cb7caa352e552c9606
SHA512b172c2330c723a183259a2126cd2c22387d3dddb6c929b9f1381fbddb9ffcf1dda5e1635c60c9b4225cd3d2e8c1fa8b9cc36216f53231aeaf5f07794e0063601
-
Filesize
6KB
MD562ec9d9e04b701b8fb104de47946021d
SHA17c2358b491b4508ca55563f0be4dce8811d19082
SHA256fb38baaa77dde2857a990957f70a1117289fae5e6fe0a1ed7f20c601f29a5383
SHA512ba2230e2cae89bff552239254cd1e9b8a0b00d289f45f36ccdb9f546fe350c39e69b4a4a44f390cc4cdfdd278fc2852633349453c149acebdcc5d61feb0d4194
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d1f72a487279ca3359bb03f47eb842a7
SHA1c18fae4d3dab3fd21a42e15d435bd18c505ef9b0
SHA256a0e2fee5ca78ceec84a1af3ca659e009a3919676330d5c992abf6ebda9b8b267
SHA5129d591283edcaea5ecd6ed03af5876375bfb4f8828c592958c51db50680a83d6e167810682f16aa779ea0220be2809b9ecad1f457f6beffd8b19eb85b4de7fd33