Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
bbbe489c5dea02754fd246cfa6d26cf5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bbbe489c5dea02754fd246cfa6d26cf5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbbe489c5dea02754fd246cfa6d26cf5_JaffaCakes118.html
-
Size
279KB
-
MD5
bbbe489c5dea02754fd246cfa6d26cf5
-
SHA1
f7f488694035383465472bdebd7d33d605c3cacd
-
SHA256
d882664589d6d43cb9c31910179d73f16c7f2e6fa90620a71910a55dd32bc948
-
SHA512
598c71db58ba7f6071d8f1a1c7b4810d3e7165b9db32dd0ca14173d61f8271e48135e0d6ed1b185f9f5b9a5cc16f04b568da55b4cacde5e81f3e874d18c310ac
-
SSDEEP
3072:VO/GObYUteIVf8iZB0O1SrghQj0RP/x3sYlvZ3nIhB2/k0m6CxrbaGa2mcUUjwQl:VO4Gx6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 4308 msedge.exe 4308 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4792 4308 msedge.exe 84 PID 4308 wrote to memory of 4792 4308 msedge.exe 84 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 1780 4308 msedge.exe 85 PID 4308 wrote to memory of 2272 4308 msedge.exe 86 PID 4308 wrote to memory of 2272 4308 msedge.exe 86 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87 PID 4308 wrote to memory of 752 4308 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bbbe489c5dea02754fd246cfa6d26cf5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11433826655542383912,15549539462879662902,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e701367ff34828b3220921fd28fa8168
SHA1b8ac79b526807ca5e28db53880ef85a904197ee4
SHA256a01c1f53f8d71f8b9551f31c963c1c7c6d7cf88a3dfe83a86e2abccdf41426e3
SHA5123bf76cb31d85b2ef567cc5b2e8996f33ce0ab8d90f2717a4aae8a6090e3c5b6d991bd37dcf2a7a2b9b9088473ace29d852f53c6e0cec0b6b8a7ebde83f8529c5
-
Filesize
1KB
MD5067eb7ed02bb6783142f6ea624d3dcd0
SHA17bffc458f155d22d6ad81e8007535937034ca2df
SHA256d3da8980c4c6a7433d9836372a9847939c972d449102cd35b416b7dd160ba2c4
SHA512a84c7bca969fd4bf53b577586cd4165ee69fb0e5d9774a5d62f6713e75ceb5846ac3e0a5dde5c380c89ce00f77e0acb7465050c0759e9d87a23dc157c5668a82
-
Filesize
5KB
MD5de3ded2472d4cc7cad7e2d0a9aaea98e
SHA115bb5459f9fb82414a1573122c80a7e890b6654e
SHA256aba33514cf29f137a1c11afb0a91711513b42b3575394e27c4eb3930e83137d0
SHA5127a16d9f548816581d1ad5e167cabea225df880afa2da9e19400221e0ab3b1ebf2b786ecf06358a7fafbe5ccac3a58e2c232e92a4089eb0947b57189759b2df3d
-
Filesize
6KB
MD53334c514dded745c4d53ba66fa13b4a7
SHA1ac8d03fe2eb7a17c4049a723d0dc343cb1925a37
SHA256717be6fbbce56807b49fb2cef0fab401412d1ba995bbdc1c63d7c7df9a040f61
SHA5123224f1972a1417e9a76d321cf8790c8b19fe3b60a5059b52d80771162f67b569032c4fbf1eb23aad516b861ce2911737a850424e5a9e904a5d7a5b491773aa7b
-
Filesize
7KB
MD55dbe064209a742b75ae915b987642be6
SHA1451ce5c693e5e4734876f3b20ecc122424d5271c
SHA256ceb8a837c40df3ec04ca32dcb13a45814eb0eb76cb719996c68ec8322341948b
SHA512d2b076729fd2af9ad5abe84de9abbaf72b296269ddb7910542aace33d9843fea8de7100ed070a62f990aa2a247da6a76ec4a0fd683ee10a6ea78ec5578a4c18c
-
Filesize
10KB
MD5545d812dce5094cd2af8738803765899
SHA1dcd30963b23356246f60cc07e48107d95223bd4e
SHA256fd94e3d0ec3298f5c5093b31582235a6eac77f85b21fddce74ffc535cd8cb739
SHA512062d06f8d7339c6cca2cf9195dd9e3fc8ab82e19e32787765eba363bddb87c987eaab064568437e7432133e8b82f400ee10ef696c7e3d694123b3b9a515e474e