Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
be5fbc237c16d1ddb10b27d55da20a4a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be5fbc237c16d1ddb10b27d55da20a4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be5fbc237c16d1ddb10b27d55da20a4a_JaffaCakes118.html
-
Size
19KB
-
MD5
be5fbc237c16d1ddb10b27d55da20a4a
-
SHA1
e04b219daaa9fc28d5a9d01545fd3ad8a6a49a7b
-
SHA256
2628114208857ae0c48ca24be5fe9c340ae4695964beff879560dacce36b0f75
-
SHA512
782c6279e77009ff85cd77b8ab3f8f95527ae7106cf093e1138539e5fb552ba7ed0821e92390e09714f820a37976a154ea7a963384735bbd699aaa8adaf4bf5d
-
SSDEEP
192:9K/ypUhTSyiqEWDLTgE9d312vXuUbZpqXYMQzQpjQZCOEXZgo8MhE29HpqXuMlUI:4/yoT/iQLXfCyQnGnp55OOunoiein
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 2496 msedge.exe 2496 msedge.exe 3844 identity_helper.exe 3844 identity_helper.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3632 2496 msedge.exe 84 PID 2496 wrote to memory of 3632 2496 msedge.exe 84 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 2932 2496 msedge.exe 85 PID 2496 wrote to memory of 5000 2496 msedge.exe 86 PID 2496 wrote to memory of 5000 2496 msedge.exe 86 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87 PID 2496 wrote to memory of 4532 2496 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be5fbc237c16d1ddb10b27d55da20a4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff449b46f8,0x7fff449b4708,0x7fff449b47182⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,75265428572654906,10619682542425431134,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
1KB
MD52ba1cfef757d8b64ef3b1c830c56207b
SHA181d8560fdb6b9b60120edd0f803e33f1ca35ef8d
SHA2565ba9ee976a0fb7245376385ca55322c66d8e6e20be7b3056e86e9213d686553e
SHA512ebbb1e2f8ea27864e86e11f81516f1685fb650aefa74cce3ee82f8bbde6a5b086ce67fc957b9c49a5bcee9e391b866b1fa74e3f15009630d07fae0f210b89b86
-
Filesize
5KB
MD55e435388f5867df8d420c9b5ef2183e2
SHA173c3e0f4a8b1b8a1891a408e3b3e228235cf173d
SHA256dd0c6bb625c1d3ef9a790b64630f88977555a4c163cdb0179c7f56969b7c8cee
SHA51215f31fbe489bd625907df8ca973d13041c095694c723d2ff4bfd0a219eaa9318f2d84f19f02e8ad4d093a1ec29b8605894cdb5b917ff23fca1a78bc4118b85bb
-
Filesize
6KB
MD506ad6dccdc0d24359a841ae5bcc650e0
SHA15d2b19c3caa89af8f642cf7bf85047f1d4e1e5e8
SHA256195d7542590c5989bbcb57257ee3636c793572eced6bd34d5417a9ace5003695
SHA5124bea9aef20127bc4da4fe7b2e92668507b5798c10685f16dab109c15fb8d2f93f2a8f92a714fb74007ae2cc8c5675aedd54bcdd4df569ed3b8fe181a20881df2
-
Filesize
6KB
MD578be523d17f224258bba9d87d4ba2fce
SHA101f1056bc2d850e08fee861699edd3f28f080e8c
SHA256dc5bb2c3e0e2fd5d48288bebea9df07a1214e4fff276e5ec3387e0a69d08033e
SHA51213570f25da2ea7ac3454addd1b82071276dacbd5186aac8a62991bbf1254680d676e2eab4ef884a95e5d62f8f7f3b8c75db06d057bbd2b3fc63e6f50e81072a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d744c6910a3462668b5c7aa22774b1d
SHA10e168cbb8639218521415996588ad6d1f2b5deb5
SHA256dda86afee515325615deb90945702de4d000df2a1faaa25589c69102296708ca
SHA5125ecc76db9659fa259a4be98c5ce329250db98859f795d5facfd66d5fcdad912f2e00e215cf2e2d7069868d13041719f6fda44d1419a35e6e23c91c038b24de0a