Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
bc6f88cb8b7d58e7ca4097f4c2a5d58f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc6f88cb8b7d58e7ca4097f4c2a5d58f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc6f88cb8b7d58e7ca4097f4c2a5d58f_JaffaCakes118.html
-
Size
37KB
-
MD5
bc6f88cb8b7d58e7ca4097f4c2a5d58f
-
SHA1
8663f7892fb8bf8ff509fb32bc3a4c7710301b1f
-
SHA256
44c11567f924eedaaf263f1e1b58a3e6be899ed7a5d4858b3156633f25050a32
-
SHA512
ef2fa9867d8ce632d7c2c6a53d3a0653252a5062ac940c62029d3db8ed515c1af6aeba8d39b816fa1b2335c0a6d17d8f418ab63418a05ba9dd50b4754918d427
-
SSDEEP
192:uWTfCb5nLINnQjxn5Q/XnQieeNn2cvnQOkEntFZnQTbnJnQYXC5AVtk2BkDyIFz8:4Q/QcqO/7IlGi3pwfOf7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 5048 msedge.exe 5048 msedge.exe 4340 identity_helper.exe 4340 identity_helper.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2656 5048 msedge.exe 84 PID 5048 wrote to memory of 2656 5048 msedge.exe 84 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 3232 5048 msedge.exe 85 PID 5048 wrote to memory of 1180 5048 msedge.exe 86 PID 5048 wrote to memory of 1180 5048 msedge.exe 86 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87 PID 5048 wrote to memory of 2016 5048 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bc6f88cb8b7d58e7ca4097f4c2a5d58f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5f9846f8,0x7ffe5f984708,0x7ffe5f9847182⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3044 /prefetch:82⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,8241667205277384330,8262954102793223487,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD593934aaa9112127453ce7170ebbb2309
SHA1bd582f7c77fc02c1eff612882350dfca64af6f8a
SHA25689b9d8c8efebaef1c016201484e4938163ac8fa8d916e765522f0ac51a43577e
SHA512aa29a79580900ad44b9eaa5ce4d0d2e004ec99819d77806a411d158f4b53e90e1d322267b12e09b41aa77a1d404d424322d77f047ba31acbf4a2916bb2c1ef0a
-
Filesize
6KB
MD55b3eab2bae1c36fcb0a325613b7c2a62
SHA10a2fd5898a30ed802f3be626e6778eaa8e99b114
SHA2561f95b67d1a84634739f68fe25a35cf94f29f3ece372a0de29481f8e2690eceac
SHA51234032b77d9f88b737c0cbb05a3e59d0435c53c8d2dc3266417cd4ff7754924fe4939a58fb30f65e221b6a49c9595c5c501dd8a631fe72d5cb7cd163cd155fdf4
-
Filesize
5KB
MD59943e3f3ba6643e9e1f7e6489c0c7bed
SHA1857a800f61930621fcd365e74e8f1fc6aa287a62
SHA256b080f946f9b0bb6072323742c7be63cd323a6461eaefd2e019c6dc2d9cbb967b
SHA51220149c0e0e79e7177e9db50d1a272a4c3ea6ea58cc43ebc6807519fdabca4eb86d7f83ab2a60e7e960953e545aac9dd1294d5603b0664cf8b4789fc387eb58b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f7d5f5c5cfd8bbac93690a33d0d694f2
SHA164d750b91579c01f09f4c31788987b577c0dc2b7
SHA2561a1e552f16250af5ee61b124c3725dddbdff0244fe1c44d99f5c166c20c57def
SHA512762f165992781eeb0e4d50f1e1d8c7a99b4cb0cd1d55aaa85bf6f8dee81c2139a2b07740e4c5cee7091dc6ea0463eaec8b232c54fb1c97fa1d3387cebb150c7c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e