Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
bde9e3f1e9d201ed744cc578b51731c4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bde9e3f1e9d201ed744cc578b51731c4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bde9e3f1e9d201ed744cc578b51731c4_JaffaCakes118.html
-
Size
4KB
-
MD5
bde9e3f1e9d201ed744cc578b51731c4
-
SHA1
72ed4aeee1c2735a4dcd8f7767d84497e9f5731d
-
SHA256
061dc6402ba2e8099ed0bc3a628fe51bd09ce10ac2895ce6a0c55410971938f0
-
SHA512
1e519ee1fb792446fc9d4ae046d0bccd678e8e43844af3056ae5bb90288f9ac5d66f22e8ebb0787622394244d741637d8987f4b2642d0cfedbefdcc91af1e205
-
SSDEEP
96:Pk7hJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oDd:Pk7hY1aEFHVKtF37sNjtXATIQFM93pD2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2516 msedge.exe 2516 msedge.exe 4248 identity_helper.exe 4248 identity_helper.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 3508 2516 msedge.exe 84 PID 2516 wrote to memory of 3508 2516 msedge.exe 84 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2648 2516 msedge.exe 85 PID 2516 wrote to memory of 2224 2516 msedge.exe 86 PID 2516 wrote to memory of 2224 2516 msedge.exe 86 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87 PID 2516 wrote to memory of 4956 2516 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bde9e3f1e9d201ed744cc578b51731c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14524438009142198262,5262675849809020125,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
291B
MD58dd4c5781d6b51d6e837563709ab7e4e
SHA1c39dfcc6c74fee82440080ad304f4ad6563aff08
SHA25665c8d78a2e1d5d7eea589341245a8b1ed156331c094bfcf0532754e162a33a9f
SHA51217a8f632d4322b65ab3ce8d103fdc828470a9e64f83e81acf3ae2226045d0b820b53eef4d7414fe671f76e181fc98804b77855ff8b8394d4dd0dbaca979c52b0
-
Filesize
5KB
MD5785559e3ef2929a7b1ba24e0a06f3d6b
SHA1735a6f194c2ce1747f0cd328d5bd7445664e7c14
SHA256baf5760586412e377de40bd337d0e7304b249eb8c673b8a9eb878a9cef937d30
SHA512d5aa52d4d69e9ea7b362be7b4dc4198a7636e3a6a53252ed547edf324b2026161c0f79d6f06e934077e745f48d70d0573e8715dfb1ca2ecb19d1841c85a692c3
-
Filesize
6KB
MD5c3733622fff1aca242620e1bbcad9cf7
SHA19192b2b7ce70a29f8a257f2e690699fa0c5714a1
SHA256562c74ae6d0d6de26844ed9c9de10516b16080fe046b10fbc8a4af29ad3b1ea8
SHA512cddf97ecdbcced44e225ef9169b64501614c69a5a8c6020f2f17bf9b8f0fb60223b63e092393040630e6f00e6d18efaab27ac36be41036de1363f234a0c30a09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f2223534eb2ba53b132026c0ff51cfee
SHA1674f8e0d2a082b9d0f5b0baa0401f6613dddb8f8
SHA2562bfe3c1b54eb20b43eee10ace5b4d632a951b84dbab9e1a1d1af644745363112
SHA5125bc198964c84dc43e5dbf43850a46bbbf94e20c1c2c0ec93f530ad1dcb667c0aafb5f19ce79df267fc15b6ccfcb7c1311f4c3a49ea1cabdb4f7c33c1c5dd6fd9