Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
beabe886ce7a86939b18f38b803bf122_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
beabe886ce7a86939b18f38b803bf122_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
beabe886ce7a86939b18f38b803bf122_JaffaCakes118.html
-
Size
3KB
-
MD5
beabe886ce7a86939b18f38b803bf122
-
SHA1
f778ba5ca8ce069d9edc06df65b8755a724d127a
-
SHA256
b8ff5d9e9c290294d6a380242951ff16db5e155277811542b38f1a0fd96d1133
-
SHA512
c64fb7a7725577b5474f8c91d8ed04f5ea725e649de5a99eebf8546e23e555e7a7d425513eb0d5fea6be32be2d9c90e224e248bead4f65a5ff207bc64c1bda62
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 264 msedge.exe 264 msedge.exe 696 msedge.exe 696 msedge.exe 1020 identity_helper.exe 1020 identity_helper.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 696 wrote to memory of 1404 696 msedge.exe 84 PID 696 wrote to memory of 1404 696 msedge.exe 84 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 3628 696 msedge.exe 85 PID 696 wrote to memory of 264 696 msedge.exe 86 PID 696 wrote to memory of 264 696 msedge.exe 86 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87 PID 696 wrote to memory of 912 696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\beabe886ce7a86939b18f38b803bf122_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee2f446f8,0x7ffee2f44708,0x7ffee2f447182⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14478555096624683006,16470357344076292873,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
6KB
MD5000a7f667a80f84f07cf253083bb89f9
SHA16b947ac339f3c7783565386ae30d43e301a78d59
SHA2565e6926da425af328e9a09d0458ad8b0c6ab4eec565e252e10f87b9cf7d7072b1
SHA512c90e8eae34151b5825d10e2e4493dba83a131a582d48749acc6245e80a979926b3d03c57d2cc680c29436cd8c34de974273f70405faf235decafea5a1e226227
-
Filesize
5KB
MD55f1820f477ecd2a82cb159b33881b35f
SHA119c6e76f46901fe0129607ec898acb1854ecc3a4
SHA25637913555c7931fce02fc05288fa62edc4816d5574c838880d410460616a8a37c
SHA512c124a00bd1cd48e310f830b828129dffa938efa287c4a08e9d08c95f54c40da9aa7f5f2d01109555c3f884f9d71767f3bcb0d43dd7a20cfa38003dc0b0f87724
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b77a2eef28ebad827030791b435635e4
SHA141920ef2116fdd458f7ca7ce6a5934cfeb59d64a
SHA2565a3c9e0160f46d273fe500693d3c6c61bd7c6490bf13a82519135bb651fba11e
SHA51272219d876373c197065185129dd0621a8feeab4453fa7c185d547fd7e93d3b085398d0d3c860422b0f5b59cf31b206ec050d082a9f74a4580207f8aebbb4f61b