Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
bef0f4a16d17775664a9c1ec55ce09f7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bef0f4a16d17775664a9c1ec55ce09f7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bef0f4a16d17775664a9c1ec55ce09f7_JaffaCakes118.html
-
Size
36KB
-
MD5
bef0f4a16d17775664a9c1ec55ce09f7
-
SHA1
69d9b217124eb886e76094caf9cc410e53a3d457
-
SHA256
24a26920c77cb897801d5a2a42ead45c4c9d496db7c32a065cb0c3a9cfb3d366
-
SHA512
2d3354108975c6525521536b6320b8b238b561484f40a98486f808e11c278ae327ab5b6389b030f8b4d9724c17c97aa3622be70fbb2c2d27807155feb06fee63
-
SSDEEP
768:zwx/MDTHYC88hAR6ZPXhE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6Tui+6f9U56lLRcn:Q/vbJxNV+ufSq/q86K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 684 msedge.exe 684 msedge.exe 4336 msedge.exe 4336 msedge.exe 1176 identity_helper.exe 1176 identity_helper.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 4224 4336 msedge.exe 83 PID 4336 wrote to memory of 4224 4336 msedge.exe 83 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 2304 4336 msedge.exe 84 PID 4336 wrote to memory of 684 4336 msedge.exe 85 PID 4336 wrote to memory of 684 4336 msedge.exe 85 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86 PID 4336 wrote to memory of 3108 4336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bef0f4a16d17775664a9c1ec55ce09f7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96f2046f8,0x7ff96f204708,0x7ff96f2047182⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16592524737693405063,10472151390637385340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:32
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD588ef11419ccc76c2b37893bae1dd9cfb
SHA144d55011cc154eb245e9136bd84148cb2a7d1ce8
SHA256cf1de026ab8db4e810b5d2915115f76768a059dc6a5dac9889fac32953747d0b
SHA512c6336b48dd7d0ac8c0d915f15e3c4c6c38986cf6ecfaed3fdedfdbe0515a2fa57c1bc4e67c5210fb889c2c298358d77b9aab1f5c89d0a58f979ef83964e5c3a6
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
614B
MD540efd08f8f0f7614c2ee2191abc2c1ba
SHA1f17a2f654f5e98448b23c04a09099019a0dbd0dd
SHA25690bbe431dd83b9399a8c74b9fffd13ba02e94d8be255f61c205758eb6591c476
SHA512b774c3271379c5402276df1cc39d663950f42ca73250b5ea538f3cddccd5f7ec6c46a839d4cef164d92f33b442beca6fdf3ca7586e7921226793fdd21f86db5e
-
Filesize
5KB
MD5cdac8999dfd9391c768f7ce6d41df54b
SHA1e3773109c67c739cb786a207e27eb7fef146256e
SHA25690f28cad367de41c3f3ca236002a2ac1045fc7a883cc552976f59177fa61259a
SHA5128983e9ce644ca722c7c223725ad59414358e6da8239b62ab4b715a81564e93c7a81f29d55fe46f9dfc938f6e45e70ba02e4e2471cf9172a18ebdcceffff70445
-
Filesize
6KB
MD5312dcb51fe8c3dbd8697d184088f86c0
SHA189ceaf2d4acfaf05bb45e78b5df0863e3bab9bc9
SHA256ae174556982820349205ebbbdb56a633d9b97436bc2f8c6202d58eecb149b4cd
SHA512f05b6409dede8795f36985c062cc171b1b3f9a08e504fec76796f1cb32af15875cd556c95fdda7ada60868ccd1ae57e9066de22f4a0b167cddc1fd9f7194509f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389