Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
bea07b960d55ee1b4a64b3b5aef63161_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bea07b960d55ee1b4a64b3b5aef63161_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bea07b960d55ee1b4a64b3b5aef63161_JaffaCakes118.html
-
Size
318KB
-
MD5
bea07b960d55ee1b4a64b3b5aef63161
-
SHA1
533c062a388b7f05cb84af95af1e3ad9fec650bb
-
SHA256
a77e2d53db3f39a00f94611a41f263ec733fcf58854be4a2f909801379685869
-
SHA512
56910def9833229d3b979c515a66f69c118cf5071337dee9d94c43ac8c77f641575a9ed4dbf7c5c5303c416f90da30f026c202d976e1c810642465f5123d175d
-
SSDEEP
3072:7pB6C8xuJFhFDM0nLJfd//Zdgrw75Z2Yri1E+YmLet:7pB6MTKYdZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 2608 msedge.exe 2608 msedge.exe 1132 msedge.exe 1132 msedge.exe 1132 msedge.exe 1132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2472 2608 msedge.exe 84 PID 2608 wrote to memory of 2472 2608 msedge.exe 84 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3860 2608 msedge.exe 85 PID 2608 wrote to memory of 3456 2608 msedge.exe 86 PID 2608 wrote to memory of 3456 2608 msedge.exe 86 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87 PID 2608 wrote to memory of 3724 2608 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bea07b960d55ee1b4a64b3b5aef63161_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc196c46f8,0x7ffc196c4708,0x7ffc196c47182⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2384 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3054948009189918466,14964433517230863722,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5861802eb55313e980731d209ba87b4c3
SHA13e60a9644cd9464ee9c05d5fc9c8d3c99792ac01
SHA256443441b1a9734e43389f645a870626fa799273d0593cca3a5ebe80a195cde44e
SHA512cf74bb0649ff4cb2a7b64cbb07ee7e9390d1ee9d3fa4f2697a7862c5c97dff59c4bc1f3ce06be52d52ee8f40181f893792013d62fc1a757c4cd035e737a88555
-
Filesize
783B
MD50380ea8a068112b5379d7aeb82ca82c9
SHA1b0807b77f5382eb0a47e41a579f00ad1b8e36b46
SHA256f6a84273bc4c8b9e4d55d787489dea14f5ec9eebf23f269d97381dba114ca02d
SHA51229618b53ca8e02ccd76ff796724364d7508682ff880e47a091cf0a497d0a8e04c7d23b65c72ca42517c1e8f5b534456ea7017345dd2588a2ebe73f37eb14283f
-
Filesize
1KB
MD53ac5a8fb91f6a97e178bdbf80a27fc3f
SHA1c6eb7f61ad00142cc8ba81c7f1c7f42f0c4d0932
SHA256b78e6dda8025a9fd218fac24ab8a285d17fd35e675be5b6c3821cc7b5e1046cd
SHA5128a1b41a947a9c919b8c9f75aebf7d83da2e707fcd3691e1ce35e5a80d750f626899cb0a083a2ae659ed0822ba6ccbef9497b2b435d7c2439ddc73f5118468a01
-
Filesize
5KB
MD58d3b59da8ac23515ec06fff1672ae522
SHA183e0fc356269024cfb95bafa8f41244361ecf454
SHA256dea95a8d5abaabd677acb1e7bb52e02175da9cccff201e248c1fc527fd60f1c8
SHA512fb16bdaf657298d51468d2a3d0248b83b12f87bf6a527ad1219c1fb959b2eb8edc94e85efd4cc5999166fe943c16918c5c48763c083160f76520715fd823f193
-
Filesize
6KB
MD558afffa03d876d7e94a4ebf19f8367bb
SHA111a7b70e4642c981e17336c932dde83813b5b95d
SHA2564035afe657e9ca0adab05db5999ff97a70b409b60c5bff62295a66cb14b4ab51
SHA512750ac5c6125fa8883178d05f8b8b4612f330479a28f67d776f472ab2a113cd162de0ee4a8e77767f3e327df6a712a625859d7974d1c6a5f6d4a4426ad8ac3cb9
-
Filesize
10KB
MD57be5e34fcf8be799e60b8b0b7e07228c
SHA115d1d2600d7fb82ca25b8cfb5b8f63b7252bbd8b
SHA2561221209e39deb5fc8de487c0d9f458b55698bb7c3ef89107d6f642846c7c094c
SHA512d8d77f00a7fd998dbb11cd5f16ac60318870969487456e517586900cd4f921a5340659bee52f1fedbf237c439561d099f84b36f0041b9d40f7d6f7eaec28f368