Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
eeca6e19fa43439860b1fa955f18da79_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeca6e19fa43439860b1fa955f18da79_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eeca6e19fa43439860b1fa955f18da79_JaffaCakes118.html
-
Size
114KB
-
MD5
eeca6e19fa43439860b1fa955f18da79
-
SHA1
83c96968750f2ea98049d9e56df1f3f8d6bf00d5
-
SHA256
62d684e4a6ec0097e263fdced6a9842daf5bab5c53a9a531075f48299daef56e
-
SHA512
d49c19377eb56878a8fe298defc1c806778ee8961acdfd912e2cb96a8af6bef2d8acecc6ebc7427cf6b267104312e022c1660dea0201d5c57cd19ea48bd85646
-
SSDEEP
1536:b8j1HJyMeotdeeEeIqeJte5WewMeeYyl1e4be7NeS7e1re5tXe7ne4deRy2e4tzE:gZHJyT6MJ2UA6Mi2UUE+9/i4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 3220 msedge.exe 3220 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 884 3220 msedge.exe 82 PID 3220 wrote to memory of 884 3220 msedge.exe 82 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 3508 3220 msedge.exe 83 PID 3220 wrote to memory of 1552 3220 msedge.exe 84 PID 3220 wrote to memory of 1552 3220 msedge.exe 84 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85 PID 3220 wrote to memory of 2224 3220 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eeca6e19fa43439860b1fa955f18da79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8931346f8,0x7ff893134708,0x7ff8931347182⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,824413418330170910,12666532508346533957,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
572B
MD5f8065add45ad81cbb17cd7a4b10d7be1
SHA16e5a75c32e10a648eaf69e8af6c6bde9e8c6e368
SHA256a6e43a9e6ff7700248c5a8f825f508ca3c4a011671dab939c8945ca85ed660ed
SHA5120d74ded6f87fe1d24281a9f1f57476bcb68a9188f9076c3abe389b4f957ffee1bd3ab7c5a3e1483cfd6839b04a4f29c1cc609ec6435178f8041e05dc5ad6c545
-
Filesize
6KB
MD5775881749efa14cd35fc80953df36589
SHA1d5f45b6b10d804d87a4c9b40f88b0fe73eec68c6
SHA25678f3d72eb988ece4ed95a5f5d9fef9149c5a1c033ab27cd8132ded6e5ec27423
SHA5121c2965f34f7703b489b25833eeb7828a7383349cc3362cb34952f69701912e712f3de94e609975aa14f3b9880cfc2abe4d8753aebd1ec0723b8130033fb2c20e
-
Filesize
5KB
MD5918ac579d946932609be9d1cdc99cc83
SHA14b6045d68a4a17e774c71c363d5b2dd4ae4ca8a2
SHA256d89fb21bb14fe98f3c0f907bd85fafc2506a167e0240f02ad537ce5ac98fe79d
SHA512c5a83f6370aa7c092007defadd3c650fbd342e9eb52b684a5b7f6f962f34c047b5b49882e04d4dc1a4d2c54b61f48ec8a0f662701e809f8622289cd92b320d5d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5201aa3dffd5bc81af302ba5b238647af
SHA1614f4a0a6d1f1bc3ace2902f12a22db7aa1e996a
SHA25619e43a9e0099ba513cf174e715d212b969c07dd7f6a90cdb7366b5f944305a96
SHA512f481f4ea60e6ca9348a5c48cffe1eb9d978dfd40a7bb8dbf8306c3b83494c673aa63ed2e26f9fda7e77f7c03ac22b7d7a71bd64e5ec223d3603226b32fcadff0