Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
beff5b987a3e17e66c12dcd18d66f4d0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
beff5b987a3e17e66c12dcd18d66f4d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
beff5b987a3e17e66c12dcd18d66f4d0_JaffaCakes118.html
-
Size
2KB
-
MD5
beff5b987a3e17e66c12dcd18d66f4d0
-
SHA1
a54c31b3a587ab26dae50fda6ffb62f516469899
-
SHA256
00f00ce299ed2af700ca9f61d82f92df68e6b097397d072f99dfd05c329cee75
-
SHA512
3eea55c824acfc5474595df42c96f68fe96a45fa709a9fc0645fca960754e90bda18016291b347138237123e89e4b9bfd7e61251aa1126257515be4cf96acde4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 2308 msedge.exe 2308 msedge.exe 5008 identity_helper.exe 5008 identity_helper.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 5000 2308 msedge.exe 86 PID 2308 wrote to memory of 5000 2308 msedge.exe 86 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 4444 2308 msedge.exe 87 PID 2308 wrote to memory of 1968 2308 msedge.exe 88 PID 2308 wrote to memory of 1968 2308 msedge.exe 88 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89 PID 2308 wrote to memory of 1000 2308 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\beff5b987a3e17e66c12dcd18d66f4d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc201b46f8,0x7ffc201b4708,0x7ffc201b47182⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4465982449631177657,10859572010690728629,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD5e971ab51751d46af0cb5df897ac66b8c
SHA1256714f8888795aae9d9b4aa317dbee5ba686ced
SHA256009f6f1d8533bcf12c391c34c81d2262f8459f2cc3e65e4e6f53aeb05c350082
SHA5126a9f24000dcb50b28e03634d1c3152314e39efa8dd611d72ab0349a22719c23da6bb18c11722b898977e46b17c8fea58165dee69660568543a8b360b734f316d
-
Filesize
6KB
MD543624463b92f8f6cae82ad09e0c02a18
SHA1ad13a4041513ac847a3350a56ce8b795589bcb3e
SHA256fe12b01c89a22b163893fd523ab4c76d56536455a06e1fbe39a193b93fc6b400
SHA5123af922f52c708d6cb44c0f21d5c0e2f798005a2d61f981bdc0bcc70b6e9f9741aa85787e6ab2dfd33b2f4beb463e106f422445fa985b7cf82cd2f40cfb4b2df0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f21483216cfac1c9f777e95f2e7b5e96
SHA139d16c0e1ce89eacab2589afe0bdfc931897be9d
SHA256c2f63c7541b2cf5b57b63c215628e4188e2dac54c430978dc5f86829b5d04476
SHA5127b9818ba921a03f1291ead5ffda509fd5624cd290224877fe76d087f00b4997d4512c473e34ed67288b2d835d77dfceadeeabc3bdf35552baf47db704f345375