Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html
-
Size
55KB
-
MD5
eebecbbb2ef23792f7bd95590a37611f
-
SHA1
2109b6d63ff40df6d2ac823c0bad48c99195f704
-
SHA256
0ee1e22892eebacf2e217d7737889e24de60b1ed8a6af293f2cb62c07cb6dbea
-
SHA512
67b8820c3625ebd5d7d52b17277b00e6c8638a8bd15f07f756b3bd4460f9010ee704401884b9f5d6573d57d1901aed3d21c36616ab24ae41e6d6be875eea2642
-
SSDEEP
1536:hGsIgSyEZdFY7reguFu5yh9EKwFrdgXgaHNk4RP:hQgSyiXRP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 624 msedge.exe 624 msedge.exe 316 identity_helper.exe 316 identity_helper.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 3312 624 msedge.exe 82 PID 624 wrote to memory of 3312 624 msedge.exe 82 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 5088 624 msedge.exe 83 PID 624 wrote to memory of 2072 624 msedge.exe 84 PID 624 wrote to memory of 2072 624 msedge.exe 84 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85 PID 624 wrote to memory of 2820 624 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff877946f8,0x7fff87794708,0x7fff877947182⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7363818524603709040,14051980717243367164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\51412788-f16a-44a9-9e1b-683f508d94fe.tmp
Filesize5KB
MD58c69442c8466acc1f7fa3cd40db75e8c
SHA163bdb0f48ae0373f41c03259d01d7d22096661aa
SHA2565fc630c1cb5a76910549c5d0449708cd26550ed4c47006ae0dbae894116c38f6
SHA5120b82bd7086c93a4d435aa0c89a8b66d60aceff44d893f0ed866d7bf6697aea4bc7eccf471fb30376280457fddaa96bc6539d210881470aa737dd2dd0db3ffd4f
-
Filesize
6KB
MD50cf1716c41f20c3f96698416708d7abf
SHA11e2d00bbb68d5a851329bd34479a316d0b8875e7
SHA256d330247c1289490ead8b2f0e628de9e070c623006c156649165316d0d60534d2
SHA512f5c6d795a405eef683da584123ee699ef3d3173b00dbfa13e17c0e754dea78a0612f3e01f9879ae316514abf68a8cb6fbbaf61b6638348bdcbd88ad095a37a6e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD50a3c42bc1a45e3f7dc547946791394bd
SHA1cfff86cfaafa5d62e406b0fdb19076ee1c82118a
SHA256d94a8ba88dc5b3b4dd16c17f2cad1c2e729b970d9e2234bab80c4f34f21368d0
SHA512373b652e2a0fd403d0d8ddd8a21775d330905d3ec5ac0c0a76ce8bda78ce36d348ac73bde953607a481b403ebe6a96e79422ee3b490e44014bb3b713edea66ce