Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
bedaa813eb63c139ab1cf8208341584d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bedaa813eb63c139ab1cf8208341584d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bedaa813eb63c139ab1cf8208341584d_JaffaCakes118.html
-
Size
34KB
-
MD5
bedaa813eb63c139ab1cf8208341584d
-
SHA1
7e0ffa4260625f14edf6becb9ff49b2cb04b0ae3
-
SHA256
4f850c29709e287c29bb35a9f926e8b079bcf761b5e9626ec663d959aceddbb4
-
SHA512
e753ffb984ae14ec65bdcb2466e5950c909d9a09a855cb1ad1267fa617247a2180dc72184d670838c262599d6d1037a0fe46cca1b301dfdc504f7b79b8dcd317
-
SSDEEP
192:uWDOb5n7Y1HnQjxn5Q/fnQiemNn8nQOkEntFBnQTbnJnQdlXCyRAqK5Ake+kfaN4:oQ/+lRpzLMr5p3+HzhEFqIQPOS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 4512 msedge.exe 4512 msedge.exe 1040 identity_helper.exe 1040 identity_helper.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 2636 4512 msedge.exe 84 PID 4512 wrote to memory of 2636 4512 msedge.exe 84 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 3952 4512 msedge.exe 85 PID 4512 wrote to memory of 2752 4512 msedge.exe 86 PID 4512 wrote to memory of 2752 4512 msedge.exe 86 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87 PID 4512 wrote to memory of 640 4512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bedaa813eb63c139ab1cf8208341584d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9f5746f8,0x7ffc9f574708,0x7ffc9f5747182⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8558934826245716428,9808858871260381497,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:32
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD58c272d509a1a9a0fd53bc7a278dc4d63
SHA124fae4e689a0a19758104f8fc681c4761767a847
SHA256f66bf18cd20575ca1e41e3a6589831ce19a77196adec2624104459f183978837
SHA512f66be6cfc0ce2a6966f81f771727a1ce088a3432c5f9dc9c76c1770ff69e58828e481bcd9bbfb00c2f6ba1ae27566c423695f34ea6f0ecea9aa62716c6e1c213
-
Filesize
6KB
MD5e7f3f7b18f995a510a809649e32f4adc
SHA18c8c8e579c20ae5859f1eec594c576f8a637e50d
SHA256d3af2823a3726b2cb95346baa72033a42dbb9bd0057480721847afefe060b51f
SHA512d3fd9ca1f908aaaabd7e5bae9364e527c0f5d9bc46b217281b37c8ff1696c29586697eaf8cde0b1551e008577daae47ac121db99e7b979a23c7158efa859bb7a
-
Filesize
6KB
MD507981e98c19a86130919d267a3c99640
SHA1cb30481ba19e045d56facb98eb2b5b6a89decafd
SHA256cf1f17f2bb71a80036ad91ff402ec50ce7d29cbc0b44ea10165f6043b90fdcc5
SHA512bff80f6b59d0148a4de0a494ec51d5de4f17b2fdf3b81f6ea1141a5a5ea3a625e80a4a3d75723d2f6d1f118b23eecb388f361455b26d715b25ca33c855692b04
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a58822bc0426ec970831e728ef7e9f8b
SHA1cd492a2f385853e7cde961195cf0616d729dbef8
SHA2564bc48b9f29e25b41550193a937989cf3ffbe8f0b070abd133ce498375a76216c
SHA5127793c6bd23bed5c59dbbc7017b25858ed504f2460aa61d9a7ad9cf00730a729a4eb29e34dc4268a8548c9da5e2254b51c4e782c02f164ba166b15399ffa36e59