Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
be2ab6085127c94f6cb6f33c774906b9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be2ab6085127c94f6cb6f33c774906b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be2ab6085127c94f6cb6f33c774906b9_JaffaCakes118.html
-
Size
7KB
-
MD5
be2ab6085127c94f6cb6f33c774906b9
-
SHA1
d3857fccece58eb4cc19a1588ce8a39e1f3b1ab9
-
SHA256
fd2131fa1dc9e887f852360d60edcb4aab6bd1748a77d630b3f49a99c44fbc36
-
SHA512
f7675d41d99cfab672cd02b2e7ef4f3a40daa476ee0a2c4e3b8c288d773c64f3a0f2f589df059e974bc59671a835e5e6a14ba492e6e683d4d464b237c3093d19
-
SSDEEP
96:uzVs+ux7bULLY1k9o84d12ef7CSTUBq7CY4WcEZ7ru7f:csz7bUAYS/nCY4Wb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 392 msedge.exe 392 msedge.exe 5028 identity_helper.exe 5028 identity_helper.exe 2192 msedge.exe 2192 msedge.exe 2192 msedge.exe 2192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 4232 392 msedge.exe 84 PID 392 wrote to memory of 4232 392 msedge.exe 84 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 4960 392 msedge.exe 85 PID 392 wrote to memory of 1584 392 msedge.exe 86 PID 392 wrote to memory of 1584 392 msedge.exe 86 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87 PID 392 wrote to memory of 1484 392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be2ab6085127c94f6cb6f33c774906b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff877946f8,0x7fff87794708,0x7fff877947182⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15496576177383804233,9688776449472478695,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD56c5446aeb6a1595e065475005149f15e
SHA1cbb10224f6ad39fcac33b91c3216f0737c373665
SHA256472db7b09ea7be48fba78b8d1c75e53efd11f56671d93c4d0062a2914b30b67a
SHA512d59d89379b5f23130b93e8b22413bed19b798079dbd7182d776d5ba60ee8cd74b87635ab5957ca2e9d2a7238b5b8648422f9eae996e2bf6ff3a0b3ef816c2305
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
476B
MD5e982e73816d83e300f3c47b11dd8abb2
SHA196605fb9546eb7bb3238aedc6fb8fbca4e655611
SHA256e90eeeaf1ded249833f012a531d440e84171db9b0c08f978a09abbe2c48ec08a
SHA512c425b75f75a1f5496ea94a569e7c63c87030ce10e5724887e7a88a1ded83fb513e8349e6ab2ba32e533f47258f78ce0e46a758e8492c6b7d4f8ee21c769454a8
-
Filesize
5KB
MD5516ced7e026a9dfa62c0fe77671b4245
SHA17ade463adc5c549b64b60962a751588731cc574f
SHA256f740e766a675878716aa2910ab10ba403e30f43df2744110026eea4ea522d932
SHA512717c34aac8c7289d54b7785075074cbf5838fc611e477bab6f8bb2031e5af5babb3d924a85297a156465305e925253a225d061220081c689af10147944aedea9
-
Filesize
6KB
MD5d149eaa37220c6922bdf4a5d4adcd03d
SHA11f341c463b3dec39995c08912e5ec0525c7cf9f6
SHA2564b1e357e66a6a47a30616f2ec0543e5a3b919c33df554191bb29fc6c05a6ada0
SHA5125dc2d16e337031a9c1285964d0ce65c3b5a8782e745a357817d45c9d6f76b022e15860e59389e672b5d8e940ed9221d9b148314da137f9b7fbd578f4d11ee085
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145