Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
bb3c85c5016dc321fc43ae5a6c0f9cf4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bb3c85c5016dc321fc43ae5a6c0f9cf4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb3c85c5016dc321fc43ae5a6c0f9cf4_JaffaCakes118.html
-
Size
17KB
-
MD5
bb3c85c5016dc321fc43ae5a6c0f9cf4
-
SHA1
f995da10d0a4af616aa982df4e419f4b1a4c57b8
-
SHA256
47e0f3ab679571186bea1af9d3042cea85f033cbf7c6c86326352808a6997bca
-
SHA512
5286af6af3aac30551fd1e5c3a6a4e976cf23deade072adf3fadbe238bd7eca0501f7af6f6700955176f846a3381a45da8477b4d6bee2a90fcb18a673a21fedd
-
SSDEEP
384:WB8Nc81GBVtSNVynYhyfxQy1WLRA56sui3qYV7VTzp2bd4+i2V:XcDCknGyfxQykYjuLYlniv/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 180 msedge.exe 180 msedge.exe 4112 msedge.exe 4112 msedge.exe 2824 identity_helper.exe 2824 identity_helper.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4448 4112 msedge.exe 84 PID 4112 wrote to memory of 4448 4112 msedge.exe 84 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 4184 4112 msedge.exe 85 PID 4112 wrote to memory of 180 4112 msedge.exe 86 PID 4112 wrote to memory of 180 4112 msedge.exe 86 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87 PID 4112 wrote to memory of 1584 4112 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bb3c85c5016dc321fc43ae5a6c0f9cf4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14090051594876483921,2966122451008538803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD589db466733f8d7437499047e4b5aecb0
SHA15e8546ff78b172dab08927020d69bfecaf4a6203
SHA256bc3f7a690062dbf64044aeb2f6fe697ea1c8f6c8f3ba897e5de3121d3a0a2fe3
SHA5120b36d33953bce30fa2caf253714c6a32ddfae313725ded0fad0499583de5ad353fabcc0c8450fd49662306589f45f1fd1757eb7f4c7713b8d0dfad7b893f992d
-
Filesize
1KB
MD590e6f1a52c14773e29bee2934580cb00
SHA1017d9d16fa9a3febe695b1899486f9c4c6233648
SHA2567f40f3dbbd4a658eb05217e9b8f79dc1d96a1b4ac37d3c5b06c5880fe910afa1
SHA51218e862766f9d9efc722b821510eedbd79cb682fdb3951a495649769907401e543112962cd1e38f2b9d25ec4663f11a60c9dbf2493a503a6adb020c144d161714
-
Filesize
5KB
MD594655b5dd0562f5389122aa41eff7e0e
SHA1f3645675f214112e07fde295f9ce64d072f0f277
SHA256b6f6818f4a5816ad90b204b7ac78a894e187a0150be37a566356bdc8c15cb6de
SHA512a1589f15787f11d9bff2c5e9b66c4d7dba2e9312cb2a3b05a55d95506276a32df61b4916929bd9b791b70637f79efa058cbbc752eb80677dfa35d682ae553247
-
Filesize
6KB
MD50fc99f03f531ec35d76c5457f8ec26b9
SHA12c58e3aa3339a1d2056da0467b4368720eed9ca0
SHA25644a6d021488e503a122f852d977b833ff74bac1b8f3bfcc161b44164242630cc
SHA512e950068f00d734e07aa1f90fca817ea8e70bbe77d1f04fef6807f09dbe8b542c781039c429711221cb9d1bd8924d92937c43bc6b57ec5dd284af6a78681b75b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e3cdece52ed21aca1304d139cd3a0a5b
SHA1df89653c629e18ae5b08eee0370db8e32c07976a
SHA2568a090be701867d1cafd9be84e1aeb442ea1fc5755ed290b1c5d4aeab2069a01f
SHA5128fee456ff5738d8d7ba541bbbbda1499dbe190c9ea7066c2745171fe3190df4d5e5da30ed75febe3b8d5a76d6052c1a9e91091beab821b600712dd7a5ec9d398