Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
be6ddf4ab813c7baf0a6763d46b35304_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be6ddf4ab813c7baf0a6763d46b35304_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be6ddf4ab813c7baf0a6763d46b35304_JaffaCakes118.html
-
Size
23KB
-
MD5
be6ddf4ab813c7baf0a6763d46b35304
-
SHA1
c11f04672cbf64a3dc8b331987ff2a5b1537dae5
-
SHA256
217d7b154b9d072d17a51350313842f1c53558aabe9ded9224e05d7540c2585a
-
SHA512
ff2cc368e50cadbf3344870ba91e2c06c70a51d41705f9bcdec16640a1762fc4e69b77101ca691644a0cb604939169cb2a1c68bf719f3431d29c1c096106f4e2
-
SSDEEP
192:Re0ok9zFb5nanQjLntQ/9nQieNn1nQOkrntn8nQTbnmnQznnwJnQtAMDnFnQ7Xna:Q0owzhQ/5Bn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 2468 msedge.exe 2468 msedge.exe 3888 identity_helper.exe 3888 identity_helper.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4680 2468 msedge.exe 84 PID 2468 wrote to memory of 4680 2468 msedge.exe 84 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4216 2468 msedge.exe 85 PID 2468 wrote to memory of 4876 2468 msedge.exe 86 PID 2468 wrote to memory of 4876 2468 msedge.exe 86 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87 PID 2468 wrote to memory of 4908 2468 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be6ddf4ab813c7baf0a6763d46b35304_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8078f46f8,0x7ff8078f4708,0x7ff8078f47182⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3500273569128672264,16884906991792880112,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD570ca0ed7610dd0e21c7033b306007ea0
SHA1baad3593df76bab4aab0680731335e2509a4c12b
SHA256850959b02ac3d700096e4da8dabeb9d39533e16596daa9019155749590760f5e
SHA512a8e67533dd5535bec090cbbfc0a2ad4e1eff03d617f48f53fa29004b267d0548587d0a7c040af4982878e6757e09d957acaef364670e60a5365b218cf2c8320e
-
Filesize
6KB
MD56879b836ed29cce6ad1cbf3e2da4e15d
SHA1fd1f8189f916c492a244ae60af240e516ce0b7f5
SHA25624c9e287043aa93ef9662feeea88f23fc2a4ef584abc83839322a23429835794
SHA512189264a54df59a426b6d7bf53d31f041dfc975498abdee1c99115623392ddf39473247f2e480c49e22d1245e70b8bf5be65b1d2dccb18e78da6af9b56c3ef8fb
-
Filesize
6KB
MD5135fb288eab2af8791e1d98de7998c66
SHA1d11cbb403f1d9beb11d7cc056f498bb5dce882c6
SHA256c87992f79967504439ed5e6a5f43b828fd7ef35d02aa7cbaf4959a1a61036a54
SHA51268d6d8bb8e0443be8cbf2174ecc5e4c3611ae18f333e49ff078782589711313518b17133f18ab9c6981dcef96e9925200d62737144d79755170decf4eaca362b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b1e669c619f6b1c1c1ab812b25adfd8f
SHA16de8686c6894c55fd24f0b004163613ce3d2b6fd
SHA25619a6d493eed3a59a2744baa64aed5f3465e1368d56a3bb2b0e2e983c09de4a25
SHA5123ae635b41d7086f3dd654964572ff3b28d948d34953bbf2996542e3e8b3073a2be97f31101cbd791507566b8afc9258d60a73b5527427d920e07f58415e9c5f8