Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
bb71642ea0bba8d9a121667e103e48b1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb71642ea0bba8d9a121667e103e48b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb71642ea0bba8d9a121667e103e48b1_JaffaCakes118.html
-
Size
23KB
-
MD5
bb71642ea0bba8d9a121667e103e48b1
-
SHA1
f65f5b70b0af47b9e5f96f681689773d85aeb55f
-
SHA256
49cb8d8da5a31cc4c4896b09c8006d476c05722928a290159f323aa76820c55e
-
SHA512
3c0ab3279efb37b073fe622c9208ca184c5abb21cd0ad80a13a632e37b56b0e7582fd4015228fbc61a29d721e60c2917ddc621d68edca0fb502bc03453f075c9
-
SSDEEP
384:72obP/fnRQkkqgoAu3X4YsCQ/OJ8q+PFWps/yvailu9DISrUKULd:v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 3300 msedge.exe 3300 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 2144 3300 msedge.exe 84 PID 3300 wrote to memory of 2144 3300 msedge.exe 84 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 3400 3300 msedge.exe 85 PID 3300 wrote to memory of 4672 3300 msedge.exe 86 PID 3300 wrote to memory of 4672 3300 msedge.exe 86 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87 PID 3300 wrote to memory of 3452 3300 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bb71642ea0bba8d9a121667e103e48b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa50b46f8,0x7fffa50b4708,0x7fffa50b47182⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4509222704380061716,5026969458231678867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9eb08fe6-d1e5-403d-b546-5c522033ea64.tmp
Filesize6KB
MD51308039a77fcf19ccc419fa6eb715ad6
SHA1b3ad0b1e8ede929108dddfbdaa474973e32f60ab
SHA2563fc146fc4fbb962c78e2398e287723bb7ca40be4ed5b06a2e614e942c4eae3b1
SHA5122abd1575bbef89b86876cd7a0683850f540e4a9c67b66ace87c914bbfb7aef117c282a20b8e429120b4b3b4bd1ba105e133af89d3cacfa84d322a6f01e2e40e5
-
Filesize
5KB
MD595530f37d4d41d48a862ab44bca2c0c8
SHA159b172711ca4fbde99ba2bac0a96c2a3e8b7f9a2
SHA256a100a9e3476e6dd3e8372f099068f5de0764c9d663114e6ac523014d22561912
SHA512647c69d05ba4d95be91392319e3b73f50c26039f8a8e30638942fb3e43ee1fd3e6ab1462d6daac716012a17a86ab05e4455722a54ed8c29b4c5fa20059e45dd0
-
Filesize
6KB
MD518eb466977083983510f84a168162c9c
SHA1c5f79684e4bee55706694c167372824b10089b8f
SHA256ce604238c3d18aebd974d52860fbe9d36757c95fbe773b0106a96874e73564a1
SHA51215bb63c7f40e1463eec4db061caf4f41cecfb4664b6dc25a6c397d691f314c4bce07507cea3503fd4c80c614fdf983c30cb7c430538ada23dc1e7e99f86b9598
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD543ee78c45b7b3b00d61564ec1a33ef9f
SHA1adf29b262d27d52579da063be02db3980e9cffc8
SHA25691fb3e69497720a83eaf52b77be8a15fe5a8695ab9925dc02ad318fc6bad7f02
SHA5122f9995150e60b4f85bc13a69b3c1ec0a47da2fae17b7eee90c908d7d085ec58d69520cf918fe6a71c71cb2d18d3d520fd26fcdf3b6b4824aa7b8796b482130d9