Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
bbd70ab261bcfb5e9db91e5da98fee2e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bbd70ab261bcfb5e9db91e5da98fee2e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbd70ab261bcfb5e9db91e5da98fee2e_JaffaCakes118.html
-
Size
80KB
-
MD5
bbd70ab261bcfb5e9db91e5da98fee2e
-
SHA1
74378a948399360bff494c3c4a8f0ebc9a9f8599
-
SHA256
232fbde103523e367d91d126f0eb30f55df62d4848fd2ecbd491a9863d1e716c
-
SHA512
85d442239f3ea513b204ffd1652cd4a46b9ff2eb4500d8b699a717304e6e6f27546726191d6c85cbead87c2f832dc38350f88d56acbb49d640ed608ef6ae9220
-
SSDEEP
1536:40ePBI2NJMOvoV4IVf2V/GqCqw9hKPk+lG++ugCrCx7iZlFs2GR:4XIWJ/vc3V+V9CX2kaG++ugCrCx7iZl8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 4632 msedge.exe 4632 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 1944 4632 msedge.exe 84 PID 4632 wrote to memory of 1944 4632 msedge.exe 84 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 4752 4632 msedge.exe 85 PID 4632 wrote to memory of 3512 4632 msedge.exe 86 PID 4632 wrote to memory of 3512 4632 msedge.exe 86 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87 PID 4632 wrote to memory of 3516 4632 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bbd70ab261bcfb5e9db91e5da98fee2e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe318f46f8,0x7ffe318f4708,0x7ffe318f47182⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9027337364811050482,12104607527375454002,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9027337364811050482,12104607527375454002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9027337364811050482,12104607527375454002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9027337364811050482,12104607527375454002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9027337364811050482,12104607527375454002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9027337364811050482,12104607527375454002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\24914664-f73b-4219-b752-5b2f66fb9102.tmp
Filesize6KB
MD507caea86747afb8cc11ae7f0b5df9c9d
SHA12f34388ba0ea7e09bc82cffed73440746bb7ab13
SHA256adabbc739bfda8921db14a85798d23a7248d2b4ae29e494694b4b3a34dfadfd4
SHA5128fdcec6d6a59a5e0bb62e169a5d1c93534eeeec0d0c7c4e2569e936dc2177665a029d13f0ff270bed437107700afa3072f209f62ae5b4a9728f603f903c66496
-
Filesize
19KB
MD5a498961c00945b5d9fe00a813b71f366
SHA16c93037a5a2d34004a82726e5c0d1309a56cd900
SHA256587fd87733755cb9b59324b070186c221b19e75b2c30cc5ff13c0e445d9baa0f
SHA512632c3563b16beb6f551c881cf8d6787afd773ec73f57301f2ed231c5643d296bd1bdee54f4c1a5f646a1ee518d13e3b086e9fe75569ed8e9481e96555292ce4f
-
Filesize
29KB
MD53f91a463e4f503da49144da592683a7d
SHA118b057b49d3cbdeb0ca05883d7b98b61a6393427
SHA2562ccfeb74491c24d10b869251986538a99162de1e0a1a2615d89ee456500cff23
SHA5127155eec857b1002674798b92e51bcb404447af59dd5ea1f296cbb9b2a18bc0c1a3ffc7e4da383760fff760a23cc5d802fb4a5deb46efd7d5410744ccd27ce246
-
Filesize
670B
MD53ddbd96b15b4a150461145474c05948a
SHA143f26262c81f4420e378db5e3591f557844ce90a
SHA25605650d017c9968d4d79c692acc78b8518ff5abb1f512da4d1ee403ebcd7dd8bc
SHA512e2f46591675261bb299346a65bda1ddaf7582d2b7c89f10d3f630e5c8b2e074ac078aa3b2fb96d7e960a2535ccdf682ffb8d2ba7c59596cb011ae25474636a19
-
Filesize
5KB
MD59b182312ee75a83cd5deae9c11595817
SHA1ae63fefe218fd56e49f603e75f049abfbe039f35
SHA256c44d1bdd2a9d9f15b4650d8e2c7118a161910c8d9aab99b537c2fee6a35b9065
SHA512b5c877a7c22de4f01ea3886ab2bc719b8fb9658f2b9bde5bb40f1ccc0a187098c3fd6325cfff171cbf9cb0f7277c913fd3512529d29cdb9b6a71884d0e994e17
-
Filesize
10KB
MD521ad20ac8652e2b2b73c63a0050c5061
SHA15e05e23818a8d951420b7c879f57912d928e1466
SHA25644d4a5d5b39f39befbe6be3c5b2b16358cdbbec29571003c23911d983baa5003
SHA512663cb4a3c29834a58583723782c407f148a5f5632744fcd83a5b0835b9cd8e28e82ae2d611d0bb592d24589abf3ee5c4e4ebd4b6a698ff89f9ce7dba4cbd728a