Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
ea389a3b847d173293621951056781a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea389a3b847d173293621951056781a3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ea389a3b847d173293621951056781a3_JaffaCakes118.html
-
Size
192KB
-
MD5
ea389a3b847d173293621951056781a3
-
SHA1
42ef48aad41ed6dfc4b94ff92b1b0d02930d867a
-
SHA256
4d50c7bf89ffb7db0c01fe43a715a9bddddae1f55e0d13c439a640daf4225e76
-
SHA512
a7e20b5a258e92f05bec39ea0c4d3f7dade1406911b1fe195a8fddfdf220f5a93cc95a9f659bd839f016d5cfe67de8e52f641c28fd190df754662cf3b5e96b44
-
SSDEEP
3072:S5gYxtrsrtyfkMY+BES09JXAnyrZalI+Ye47uM9f7UL:SaYxtrsr4sMYod+X3oI+Ye4pf7UL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 3240 1184 msedge.exe 82 PID 1184 wrote to memory of 3240 1184 msedge.exe 82 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1460 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 84 PID 1184 wrote to memory of 1968 1184 msedge.exe 84 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85 PID 1184 wrote to memory of 4628 1184 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ea389a3b847d173293621951056781a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998d246f8,0x7ff998d24708,0x7ff998d247182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2569360285831697805,2958243990897454256,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,2569360285831697805,2958243990897454256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,2569360285831697805,2958243990897454256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2569360285831697805,2958243990897454256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2569360285831697805,2958243990897454256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2569360285831697805,2958243990897454256,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
6KB
MD538ca83d8925e6d4eb7296ad6cb041c6c
SHA1e02eb36657707e5995ff44e35adec0d142323495
SHA256f2e2056504808d57d6db8f84633d0971fa368c6f5c0d66fa1d7b83a21a95c927
SHA512dc9af51a97d5d51a1c4435e5ccb88e9e64fa13a9de8f0caced3f17796eae1ffbe4e6c8b9061fefbfc991805e7ead80e168c3896d9802ff614b238a8631946224
-
Filesize
5KB
MD5d6521a21a4cdb8b85a39950f2d7c52ec
SHA1775d15f7a2af5380f464419b60e90ea291e2d7e9
SHA2568719cfa6d5745779a5e5a6ec765e11d435abf436734e9fce3ffdf03a2683411e
SHA5121bdc0452d4548d375e94672f9a2862d44afa3ab276edeb5360f2b9b20f15d54433da3a6080ddb25b66418c81c701f74b1335ae570559cbeb9a66e0733f0c29bd
-
Filesize
10KB
MD51ce8435f20463e787f94218181f0ecbb
SHA1b2ce3b2298a6e33fd18ce23603017868803d9083
SHA256db9a2228d82fe39b5595a6d680fc9fc630f2824f21449efbcabf1d2cab0f1850
SHA5120ee0ff263351fc0d2de5c217a6896179ce347ebcc61aaa3976ae30193173b9c65b4bce99c4321c247d514a6d1a0f8782f42826d49f84453490681b0e4b3df942