Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
be9b78a48dec081ba8a46f752566551e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be9b78a48dec081ba8a46f752566551e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be9b78a48dec081ba8a46f752566551e_JaffaCakes118.html
-
Size
416KB
-
MD5
be9b78a48dec081ba8a46f752566551e
-
SHA1
674afd2ffbfc2a2eb5ff45d0080568b47e1e7fb4
-
SHA256
c8a8e238c62bf16cb7ef00ab6ebae63e1c3621988e2150c97bd51b8a99681d90
-
SHA512
a322d6110fc1b4d7f6d95e2207bafc72b6494da1d157f66de3278a7e38b8978a26029dce890e44cb9ebd2454f047f9b05ce17811aec2496129cdf76a88b0d321
-
SSDEEP
12288:GOeQih8s3w8KNZWC5zylfy9dLuED6Nk5UvBm4/rqTYaso8dIgsr/4bKJtmD+LHOx:+3UWC5zylfy9dLuED6Nk5UvBm4/rqTYB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 2328 msedge.exe 2328 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1552 2328 msedge.exe 84 PID 2328 wrote to memory of 1552 2328 msedge.exe 84 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 2948 2328 msedge.exe 85 PID 2328 wrote to memory of 3664 2328 msedge.exe 86 PID 2328 wrote to memory of 3664 2328 msedge.exe 86 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87 PID 2328 wrote to memory of 1044 2328 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be9b78a48dec081ba8a46f752566551e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7d1746f8,0x7fff7d174708,0x7fff7d1747182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2416 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17007477521450793455,11036768871983976442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
304B
MD59e860adb0e8233b3958a07bdc4c174fe
SHA1b2241356e0e89b09dfdfa6fd43d10686059bf72c
SHA256e8db758cc2d561f9abb6fcf523f38c30f6740c4fe8d02ffc1e90b3ab3cb5536c
SHA512740c53334fd7364c9767375f9a74a5a16823fd24587cdb25f47079ba3b062e7696f8a00285c827beed27d2ae09535755d6ddfd8517097e899511a77640199721
-
Filesize
5KB
MD5dffe1da2b323573584b209d59d2ef893
SHA1c82a9cc9d19019132b21db1be1d9f081ff4042b0
SHA25669caf46bd87b0cc6b30c9a5881832fba2caa1af42727a14796e28646da8eda9c
SHA512128c72a2beb6031ec1f387bca4644517d7247fb40350b2ffc8ad6b1961679a5a5098d189bb0befd3dd1107e20f77379721c7186c1bd5cd166869c252acaa63a1
-
Filesize
6KB
MD54ecff48a8f27a90013b5a4a1c213f748
SHA1555caa91779bd97417b0097e475d5bf2635d9da0
SHA25676cf9d7cf8d08c09e46e707732080f19aa19185ec4736e434b7ebfc6af86ae69
SHA5122ea60887e49e62820ddf16228001cf8688fb21cc43141f9da21ea1555ef8175125a105a48f0d464cd1bcc24663b0db0870d5cceeeb81a9ca5c0d8f47cb26c869
-
Filesize
10KB
MD562b53a3cceefca0dfbda258f7e3fe8b9
SHA1684bb4330a8425cd3a7fd8b23cc6861f88e5b28a
SHA2568f92deedd83b11a7d774183d29a78d205e7c6bf268d600fd977306f2cf72a861
SHA512e0c03137cbd2c89a20beac42bce5955c05e74c64d5192c10542898358d44536794e460dbe89e8862d0b1a981787aad4872813f6132bccb431d12431d97aead27