Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
be339e872041b54117a1dad2942fe71f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be339e872041b54117a1dad2942fe71f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be339e872041b54117a1dad2942fe71f_JaffaCakes118.html
-
Size
127KB
-
MD5
be339e872041b54117a1dad2942fe71f
-
SHA1
c4bcbc97f16baa7e1ab9e3d1dd0872283072e845
-
SHA256
10c0f7c9746e974fa67b646aa50065b74539867ae86fc649d5d4fd09393e8dcb
-
SHA512
13a44b9845ef31c7385ce9386ef41439a6c1d907480fbb79589b9fc6246a23c3fdaff379830bcb7efc895e27f0dcb6b9ea07ade26d3ed60da2644e9cf9c26883
-
SSDEEP
3072:SaPw1mL8ZiyfkMY+BES09JXAnyrZalI+YQ:SE6sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 3952 msedge.exe 3952 msedge.exe 5036 identity_helper.exe 5036 identity_helper.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 876 3952 msedge.exe 84 PID 3952 wrote to memory of 876 3952 msedge.exe 84 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 2328 3952 msedge.exe 87 PID 3952 wrote to memory of 4416 3952 msedge.exe 88 PID 3952 wrote to memory of 4416 3952 msedge.exe 88 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89 PID 3952 wrote to memory of 1380 3952 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be339e872041b54117a1dad2942fe71f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd3eb46f8,0x7ffcd3eb4708,0x7ffcd3eb47182⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4076 /prefetch:82⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16954012431802399336,10716016653970851377,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD55353138b7a296cbc20f0fb631abbfc19
SHA1395648e3f0e4d2b6be1b02ae5f54b35c000fce22
SHA256da449ac847ae64b8218d73e5a5ecc425c5e3805e7f4567cb9438eb392292bef6
SHA512da447d81bad9abff8117d14b85f56bdc69238b34bc2b5bcdcdc6458cf0ddc43318eea05dfb9d74e5a92e7aa54217f187ca6d4c8dcab17d2c364d0e17b6145794
-
Filesize
6KB
MD5b534ff298c5e01c75302901d3d54e2f1
SHA1952a3734e1df5b6387269f885dc33a9df79015d2
SHA2560f444c689d1bc2fe3475d3e1662fbbccc1efbe16ff747d43cc1a1fc57b30858c
SHA512c5cff9d846c4fd5d36ded07636e417967a2ff294bcb622976037c063747abaa94d5f15f1ac6a58dce5af5edaffcac10136ef2064b44d8815e39824c337334a6b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ebb984fa5854df0d102306466d8c6107
SHA10b06ca846f900c7f8b3676bf29a7f677d8393854
SHA256f02ca2f62483d8936d3038a984c8ac8390acd94060230e7625eeb0ba6f18a7da
SHA512dc0f78cef462e6de3f16a2d367704c4a9e3f96ff64d94175c276608ee76a7abb5a00e82d07918d63aa225de466589c92cade4df4739b06a0aed413e54f6850e0