Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
bb752e1c7d22475370b75f6740a759e6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bb752e1c7d22475370b75f6740a759e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb752e1c7d22475370b75f6740a759e6_JaffaCakes118.html
-
Size
70KB
-
MD5
bb752e1c7d22475370b75f6740a759e6
-
SHA1
bd1d30ad10ceea3e38e4f81205d6db9a886577a3
-
SHA256
e42d83df3caacdd163f66497cf6e95459b6f93abc311555bb03a2bbcdb6b4899
-
SHA512
34a357c8f2d5d6ca1351a0a542fd992eece18ed31d48fc3294ad4168899049c4c2160957eb741235a1ec305d9824fa41cb985ecda1e3eda6fee59d6a4e394d6c
-
SSDEEP
1536:W7XQncDaAP/KmjWuQQ0J8uiUHYlvAiORRC/t3e/500Y8iUdiiso61yqILrKNjX2S:iaAXKwWz/J8FvZt3e/500Y8iUdiiso6H
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 1328 msedge.exe 1328 msedge.exe 2544 identity_helper.exe 2544 identity_helper.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 4448 1328 msedge.exe 84 PID 1328 wrote to memory of 4448 1328 msedge.exe 84 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3660 1328 msedge.exe 85 PID 1328 wrote to memory of 3584 1328 msedge.exe 86 PID 1328 wrote to memory of 3584 1328 msedge.exe 86 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87 PID 1328 wrote to memory of 2436 1328 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bb752e1c7d22475370b75f6740a759e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,15691505267906072106,13924369560452241938,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3294c7a2-d802-4aab-b124-1f237b3f7099.tmp
Filesize1KB
MD5d4708cc2cd56ae26e4b93bc1478798cc
SHA118a91d549e56910f89cc9e7a042c4f20f092b26d
SHA2568fccf4648c1b909b8444cbba24df6c0119a596101723aa81e99a4227d377b74e
SHA5128d4c113f43f00d85f7288590e046d4012da91b5ffab43ded524c299772bbc13ebe0d3232503fad1555ece5467a5bd79178e074349f4eb07895de56e04f062c1f
-
Filesize
1KB
MD5e1f1cd5df92e5a898b262756e80411c0
SHA10ad560ec20551441b970016c084e8c7ce939b13d
SHA256a58fe95607a40b958dbf5076df311f7e38aa569db1788e0b0642a08ff50a2f61
SHA51279e1c7082ee42c947ebe4dc2b541d084645a37964478033da0eb7972f4c54fb462e43302940534e67cdbf23f70382a83108f403244ee9eff16797afbed70974c
-
Filesize
5KB
MD58de5feeb84119239df04d1cf320f81da
SHA19f4614e04887211bcb53cdd157deb656256a9df9
SHA256872bad732649bfc87296ec09ec79ea769409e731f3367f8d64ec27efcecf0c2a
SHA512f98a282eb5878aafbbd78aad4942798c8536efad05be0d9d68c24f52dbd7d8c8d6461ee7b05dd4794d915a42eb0bd2179fad465facefa80d058229acc0681461
-
Filesize
6KB
MD5bb43e6cb7dcee001c9c882847720d1ff
SHA134bc3461ad3ae7d1888bb984bab2cdb25761ce14
SHA2560cb1f46fc52cf35d0ff0f5c7df04c81ef81a7b9f6254b6ea52f986a22eb68951
SHA512e18384b0fcd30588c27d4322d754a415ce674f669bae17b81869d16abc06354e603fa85afbb37e885a5c817b23ea64ddebae27aa8f3336fb313a080c0e063e5f
-
Filesize
6KB
MD597a0e13df200bc8f2575904b5f3d7c4e
SHA1b5ee7181500910f14b2e005bc9893f00a43d3e4e
SHA256fc5750da15f29c4d9e4027712f3b58130c17dc949bf0b85e177aa9ee361e70b5
SHA512298885ea127a969a4d31b7d7f6adcb3b0b2333694dc1882fa7619ca6c11dc86e2155b03ffd9823f3513815487478b2d2da2a79d35a5cc929c34b2396b0508eb1
-
Filesize
1KB
MD549bab62518dd14db2397862a563c424d
SHA164d3e871154628a76086d1f7e3f4e59cf3233c60
SHA256a588e86e9cc1c114d2ae16024605a9d9339b3f68540d92295d62580dbdcaf693
SHA512ef53ef948ce97b95e0bb520f4bad4d1a9e01458b8338c1c1d44f423f19f3d8f8f196ea2c530024bb110ddfceec0c6f90e99e58c7b2896e9559442b9e7aa506aa
-
Filesize
873B
MD5aac4544e81b1a23e7ef4cfc19f3e1f54
SHA1f3fc49a7a6d21631b44c664dd9a74812c1cedc60
SHA25660df8257a06c746105c75e695bf965add08afa0669dab5dd548bb98b2c4b26a7
SHA512595498dc8982f798f3f2922fdc17dfd4c82a37918c3c1314b13eab35c2202cfc5b5e82f24cb941043936020862427063068f0caf5afb8473b4ad15c8414a259f
-
Filesize
706B
MD59f97302671f75abf66d57382465aece1
SHA1874bdc54736721e6f3581b88b7cac266ef563ba7
SHA256977a702c903cedae77e136bfbc6316e749cfcc23df082fdae5693effb899c077
SHA512bee27b11c3eb7c46c535128c76bf4048a1ce53297733bd2206377c4a5a93b3683c03ebd7d6b157aeedd8115feaddef54ea521e9585db7eb2ad1742e9e700aba6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD567e1c57da84de6f53c2740f3680ed1ca
SHA10e292f444ca13afc14ca469e45237eda7503c81b
SHA256b6b3eb38016a5e0f5a973026dea98902ff4c1918c7acda814179a0ba4280bbae
SHA5123eade6944dc8784b6d75ea5c2bdcda87a4f016d6b501c03bef137119a91ddd08df1eeb1cf6ced733a5e1175f8e6f06efb4d0d1868ce35ffe99a0b7bf63cf5a04