Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
bc9ca132df99eeb117ce228277f12c30_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc9ca132df99eeb117ce228277f12c30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc9ca132df99eeb117ce228277f12c30_JaffaCakes118.html
-
Size
11KB
-
MD5
bc9ca132df99eeb117ce228277f12c30
-
SHA1
c6604f85be17506dcf1b60bd81bd1c0878c62559
-
SHA256
efba9a19193ea769dea88fa4f9f82ce8679e91d014e5947a1bde236bfe3c3b47
-
SHA512
44af55dba8c9759129bf2c28f0d91d6df82717bdf833ce45e0d083f593eae72fcc71fe1a810b62f11571586536936a0bfc77253248e7478150e6efafce73d382
-
SSDEEP
192:I+hW5jcoOqK4rGPJPolqMDoDUh7KtuXygHdGVrfLmskxj8KlmP3KTAL3E2:F6c3/hP62Uh7Kt+y2dGJUxjbJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 1732 msedge.exe 1732 msedge.exe 3028 identity_helper.exe 3028 identity_helper.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2064 1732 msedge.exe 87 PID 1732 wrote to memory of 2064 1732 msedge.exe 87 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 812 1732 msedge.exe 88 PID 1732 wrote to memory of 2084 1732 msedge.exe 89 PID 1732 wrote to memory of 2084 1732 msedge.exe 89 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90 PID 1732 wrote to memory of 852 1732 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bc9ca132df99eeb117ce228277f12c30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a8746f8,0x7fff5a874708,0x7fff5a8747182⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,551662610939743173,12292329773475885123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5f4ee42d4ac26266f6194142e26e48e0c
SHA1a920e5436f6de1bb4710be9f78aa8e9f66bb9ff2
SHA2568218a6e76249cd0b35bac055d52ce1afbcd523b6621369aba9a7542437174ad6
SHA5126476b1377787dc28a89f7ed657a2d49be55dfecef8ca2357a6f39ea00978ede84f691c06a94d5a971b314f748e60c522f6f28cd5aee74c186a0d59964edd0b50
-
Filesize
1KB
MD5bb4f0f28c7cbb1d4e585918aa1591341
SHA15b75523fafcbb2f7caf84a1886e8e620cefaeb11
SHA256782c6c50fd1a783dbb62021d8cb70c7114bed3548f7001a14f765f3690ad301d
SHA51207abbc987fb4c865605493a9b37c585647a8d0dce57f68408cdec4d6bfb6aa6141b96751d847aacc4ca1be51d5b343d47b5d8d3c167e7ca763957a17d7103190
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5e31502e57b7a4038edf85daf94a8b11d
SHA1f7754b761103e8f85c09251c835c0f13ad2d4a6a
SHA25696f59374abfbcf2b671c6379218638a0679110e5ef4bb40c332721efac9469dc
SHA5124f767029db7ecb98dd307d8cc4145e84507aec98ddc63260f6f41cc4396b30b5c56320455822c66dc699e4ab216fec0244a67b727e76411b1ebd83c6478bf6b2
-
Filesize
6KB
MD5b04a3e1a8cea3f238de182403812f07b
SHA112223d9d9f8680632a686f28161b7269d29553f1
SHA2564e146e8f6dfe4d4225799cf3c3ce065c4ab0473eb199ea82c9e51d6eb5cd23eb
SHA5120d491d77e2c0d06e5685310a3225176c55be15afd453de74b5504fbd2373e0df0449bf15b6976b8663ccb76aaed10bec2555319e8909585591b5317cb6201f0a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD532eed06dd7f0473e4aeb6bf9338322e9
SHA146a22ddd03db9012151e99650c29efe6e149392b
SHA2568b4ffee25c46f591e81e03eef8cb45f219f342da07cca988a71cf89a4ce6ef24
SHA51219f9e731e37543a8353a301ec62ac0555165cbb07392b9fdfd50ac1a81c2a20929eddd9dea3ce19b2cc722ff88b64d261ee9dd7926dc56ec0876a578010119a8