Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
bb7b6a3294b4b9b3d4816431b3933915_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb7b6a3294b4b9b3d4816431b3933915_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb7b6a3294b4b9b3d4816431b3933915_JaffaCakes118.html
-
Size
57KB
-
MD5
bb7b6a3294b4b9b3d4816431b3933915
-
SHA1
d5e306731e33680ca83747d3db74ce046559865c
-
SHA256
d0ede671ec7d0e458c3f57888b51fc6229a63abef4322cddd66aeb367d51479f
-
SHA512
1087375086d4717ca22e4eb7a5bec4866a33f2b607b2c431747eb4c50609632b76eef6657cff8502340e4f44444d45abac50c1704f5f907307ff8b8d4f65377e
-
SSDEEP
1536:ijEQvK8OPHdFAPo2vgyHJv0owbd6zKD6CDK2RVroD3wpDK2RVy:ijnOPHdF12vgyHJutDK2RVroD3wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 392 msedge.exe 392 msedge.exe 1668 msedge.exe 1668 msedge.exe 4764 identity_helper.exe 4764 identity_helper.exe 6032 msedge.exe 6032 msedge.exe 6032 msedge.exe 6032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1220 1668 msedge.exe 84 PID 1668 wrote to memory of 1220 1668 msedge.exe 84 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 4104 1668 msedge.exe 85 PID 1668 wrote to memory of 392 1668 msedge.exe 86 PID 1668 wrote to memory of 392 1668 msedge.exe 86 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87 PID 1668 wrote to memory of 556 1668 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bb7b6a3294b4b9b3d4816431b3933915_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bcad46f8,0x7ff8bcad4708,0x7ff8bcad47182⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10018826707802786879,13386998525187397587,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5c5c838fa4f27ae486d3e5dda2f2bb49d
SHA13684df8bee3dcaf11ce494b3c71c6dfbc640bfd3
SHA25655504d9de7f8844f7f308b9e92533b8c1fccd9357393ddcbe76d675e68e64ac7
SHA512ea169dfb4f9fe040c7dd1a88fdd966098141f61c6ccc79c36808939c4e36df1f187090e5cfe7ee1de7a40428907020d1d891528f8f4ae64ef207771efc17e5a7
-
Filesize
2KB
MD5a17a5bce65ce64d97534cdfa374fa1c8
SHA1bbbfefb7ee7ee0c177ba39755f6956ad78210c30
SHA2569f892d092cc3f5bad4ac497d74930ce1e046385db8cb108fcd76da23f97b1829
SHA512ba55c2393bd87b82e93354c627d7f9c67510edaabebc48ef061f2411eaf61f4cc643e5eca779032e3900fe4764474e293feeb6594a5a27e8cca89746825e954f
-
Filesize
5KB
MD58944c9b4d822aecacf243cc5a9c45dc0
SHA1b4c82dc206f5a2179fa62754277855de6e43dec2
SHA256225ba609aff94ee76bcced0a3ed6a6e1c3df3ccf11ab45bc3d2d516b4dca3215
SHA512c12fcd309a24d2e9e8deab8fb93aa70cd80de14a4e3addc452d3272c302ec5e33412a3bc2d7fcdf81ce72761c8f73d376e475201a84cb98e28cb4670c7b0a60f
-
Filesize
6KB
MD56b1564b0d62170e7da7a46bb5d21445d
SHA137f4d5f07c761fcbf587a11b659d5bf3816baa79
SHA2565dcd1fc818135486c4e249ddc4ee56c1b43fad03ebe1867c0b552faea87155a5
SHA51236794b4ae463d73aeaf7805f1f27ab691681670ea342ce06e1f8a52e020f6f31a112178e2af5d32e8744f00c65b7733aad7b768e469ba221329650a946656cf5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a0a3ee4874d0497a8f703ba6dc3e8881
SHA171b36e7f369676279aa0a57b1e61ee840888a999
SHA256529859e1b0b6de34e523a76c040fecdae44242c1297fae962517149ec0401428
SHA5122da9e560f2618b43a5c02f5af990810fe549daed1feca13ceb0ccf4658ad303e108fa06e89fa6d4b497e432245a66e8449e4fd035d713aac0a5a54c369496653