Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
bbb80e0d8c9dc644e8f3bc7c84c70c68_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbb80e0d8c9dc644e8f3bc7c84c70c68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbb80e0d8c9dc644e8f3bc7c84c70c68_JaffaCakes118.html
-
Size
121KB
-
MD5
bbb80e0d8c9dc644e8f3bc7c84c70c68
-
SHA1
e381f6fed84c7b62a6bbbc6665d506738308482f
-
SHA256
2a0fd69ea47fda0128e9ad99ef56b09c09b697580c888ebd86eeead9f4896af1
-
SHA512
767eecc97938ee7f3a2f37d727c91311fe625f87fda45cd834c81dbf1a930480e16f14551bbafd8f361d5555a2d0002e4f7dd68e9b478791ce3f34ea7e5822b6
-
SSDEEP
768:exLV4KMAvoRh3KchGrvVqrKyPtQ6SpIc/dfV4vCrB1LDAaS6C3/G8EBeRW3E:eNCEUhCMrKi+6+fV4voDA5/G8EJ3E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 804 msedge.exe 804 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 3140 804 msedge.exe 86 PID 804 wrote to memory of 3140 804 msedge.exe 86 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4156 804 msedge.exe 87 PID 804 wrote to memory of 4120 804 msedge.exe 88 PID 804 wrote to memory of 4120 804 msedge.exe 88 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89 PID 804 wrote to memory of 4644 804 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bbb80e0d8c9dc644e8f3bc7c84c70c68_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae52946f8,0x7ffae5294708,0x7ffae52947182⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13238984853750358407,9440448634273817768,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD51de7fd116ebcc9b124a45e4d7020f453
SHA1ec4fe827196a9366aa4fe29d4294c7e0a9e5a3e1
SHA2567cf87d2347a3e5c3759d7c9960d0ab58f02fd27d681b9affd81dbc6b0531fa40
SHA5122a606516eae963bf6982c9464a7a8b828e3dd8bb628c100fa5075f23a5fb855722b5f873f8fdcc7f30e3a994308966ddd84c41410df167e12de794c62828ba47
-
Filesize
6KB
MD5bad012d8311e5891ebb17e003f27a901
SHA1016bd7ef395647065bd8103fd42bdf5cf5408177
SHA256a349a0cc59a64d2ceb39eb381071010658e886d2b4a832eb006fc96ad938e6cd
SHA512643f9e39bb970a706ac089a2260c18b23edc34e71d498e4083e7805ff629d935ba58ea803ddf790b35ad98df033f3bc9e75746aa7737ccefedc00d2c9017ace7
-
Filesize
6KB
MD581889b45ea7f9e4b3fde70fed1954704
SHA1244cb4d143b4d9dc3c2dd3de32c46a3a923dd88c
SHA256849789aa8167702e82383a56db8fc8499002f0a0627f3f4101662107051cd6dd
SHA512f75048d592937f3ce1b1fe9a85719de5a8f6e5bee1b9407af4f37309edd60dc7f8e71a2e71bb5a0447c0b3369c6bbf3aacb210cd9b3c33af2fa1528ed812792b
-
Filesize
10KB
MD5f0a8956f2c5a99a0495f0e63219ba479
SHA1844b6491fa1ba0ff854a56c64b665556a893ff3d
SHA2569b444c247df92ed8fe9834cd1c5fce2c3de5daf60892d9d84dddeb4796c3af90
SHA5122b5a12ee87947bf4fae90f1028bed91340df992e64924dfc9a6c2eedd759df3f24a88e9342261f35bf5bbdae974e9c3a8d097d62bff9dc6ead1b8140b02053c2