Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html
-
Size
11KB
-
MD5
bce38cf6a6b6e9bbef6c25ee53a5513a
-
SHA1
69d386751779964abc44ac60eb3d78a4f9b5456e
-
SHA256
d2dbf530507017174506fcbedae2055a11784f2313cadab7fe662b8bc1e54626
-
SHA512
1b1d9f41213bc598a26dff8ffefad8b82ef5c5c2b5ca4865b31cc309b9049a6c244deaac56193ab7905210210d7f30b4976df8add8b25c40da46c4ab06460a69
-
SSDEEP
192:FWbiKKm06PywK7ppqe5IqfLzSrBkdd34kf8xr0N2G1q8yMRKqFNgw/bJe/0VPOoE:FWmKKm06Pyw0ppqe5fLuredhNwQN2EPC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 452 msedge.exe 452 msedge.exe 916 identity_helper.exe 916 identity_helper.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 460 452 msedge.exe 84 PID 452 wrote to memory of 460 452 msedge.exe 84 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 3968 452 msedge.exe 85 PID 452 wrote to memory of 2536 452 msedge.exe 86 PID 452 wrote to memory of 2536 452 msedge.exe 86 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87 PID 452 wrote to memory of 3864 452 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c0a46f8,0x7ffd9c0a4708,0x7ffd9c0a47182⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3780 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,4263952752668304865,1065486084981415445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
6KB
MD540afa644958a489c9e127881211ebac2
SHA1f60b9bb0a235496ec58923ba18ef6e939a8e70cb
SHA25675534544a0fe45e6ef4af2abbe5e5041d52432c7e2f1877d6851b4783dfd8bb3
SHA5120e2fbe184d36dd7b331e25a5d9ca5afdb52c1d23d6a4111d659db6a480e5b29bd69e89ee0593f29a8ddd32dd10e6dfb5e7ab11e344ac5cd5a0714750a285c57f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f31311a6-3780-45c2-994c-c63db78a1aed.tmp
Filesize5KB
MD5da414834c9db82813562922155678da6
SHA1e2bb14fc814c6444ec748795bc7701439e8081b9
SHA25696df47b04aaf587d45e72f39064acfcdf84b70257dbdbf18fd7834354b640500
SHA5124f82a7e47e46cd56962705392bdb0fa0be4c69ac2512016ab8ff29662d6672ef21a59213a4e56cc1dc2549d31b4c6fec279cf84721cab97d5fec6d5090967203
-
Filesize
11KB
MD5b39cf8954ce2483a06f3e51db3b3cd94
SHA1a57a41728082f7f38800e56aa35c26e815d8f9c7
SHA25699b489d2008c4d546c738ccb86fbc5192377b39b6cf0980fcc7597981cbedd4f
SHA512775753f8a33ae6c5f0b30cac3bc16be7aa128dabbb4974820772df75d6169b4eaf5ed2b75ab8c89f3aa6d88f5fc63ee6199452d7faa4fb23634c145cfcd781d2