Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
bcf14e8a3bcd65fbf05005e99c738cf5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcf14e8a3bcd65fbf05005e99c738cf5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
bcf14e8a3bcd65fbf05005e99c738cf5_JaffaCakes118.html
-
Size
202KB
-
MD5
bcf14e8a3bcd65fbf05005e99c738cf5
-
SHA1
97fb7b7cd91b9e8b5b1d94b86a38b275b9fa67c2
-
SHA256
1959b82f0db0e89fcbf0c05d6b4be1a55104dd32e3aed2b610af2356a0e03f42
-
SHA512
06f879e4ced7b1add6d8e104ca5e8b8489f6ec0bacae4271fb32f138c85e706b5ee28361a3351b0c97211202bad75085b01f745a30a96b059b8d5ecef8f52590
-
SSDEEP
1536:kaazmR0886gzFy8EgJAzssaOEhgQlPPN3mJT3L0GvM:darcK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 3020 msedge.exe 3020 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2568 3020 msedge.exe 84 PID 3020 wrote to memory of 2568 3020 msedge.exe 84 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4328 3020 msedge.exe 85 PID 3020 wrote to memory of 4564 3020 msedge.exe 86 PID 3020 wrote to memory of 4564 3020 msedge.exe 86 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87 PID 3020 wrote to memory of 4572 3020 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bcf14e8a3bcd65fbf05005e99c738cf5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa632346f8,0x7ffa63234708,0x7ffa632347182⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,15858492937658300755,3162226675657695119,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
255B
MD5e13966c2ebd77c595e1768234438c58a
SHA1e3439901d8861ccf0ec0d90146f47ac8d854165c
SHA256d5868ac7f79ab6c6c47875e4d1604ab89802a5a6b1f43d4cd24e5dece6cf50b0
SHA512d0a40caabaaa8ffad1f9795f6b4d21421ce8bede9f83bde3b2b1d9dc49128c089602948b0d780d21343dbed2351154d5b1d88bf956815a10e46681cf14364107
-
Filesize
6KB
MD5591f0f4db3d9fa0c06be3e09a1267f4a
SHA134a3be709bf8ef0b602f58b5a7a04e94114ca13f
SHA256b7b08203e8a883654298e349ce96d47fb1e09c791943e236dc5c98f1f5942a0c
SHA512247900d6ae94412367b25f1accb79498b02aa74debd710e201ee3b0f8b2cb5365788f8ae835227a76942d187fd90cae67a701f179e9c5ba2fe0b8f7feff690a6
-
Filesize
6KB
MD56fb0e46a43ea5a969f016638920addc5
SHA14d3fae9ffc301f752bc3ba863f34c65359ebe90b
SHA256818d0c24c755d752f7faeeaa70c888d38f6565efef585bd1a5b1550adf431891
SHA512d75dd2bdefdd35332f36c59891eb644f23f8d98523818ace86cc6683e3a5f5189a076914bdec69a9088c102a592dfb138f753bda91f53f1a48d3d188dea8e8c4
-
Filesize
6KB
MD558ce7fc3088191e9a108f7b0980c4dd8
SHA1002d26f694c9133adbcc9f6b0eeaa586c9be845c
SHA256e048cc39832c055f522697f1c546439c09dd27de0a64f442583b28f8dd4e0920
SHA512e80b1eb649230f28f7f66970f8b265184256d842fd55dce1b224953cbb47e9ed1ed90f586fa001d178fcaf7bc5a2e9281f328d9adcc69a79be312d4c11e26eca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59afc95a67e41fa30654241d8597500bb
SHA19f8616b9c804328a04eade714d7ae5e87e477d85
SHA25662cb196bf9363e31a1a9bc642b1778858a8fd2d4f9cb6923ac92b97e8e079f39
SHA512ed547f3ad6542ba6318cbddd12f88780c1ec4560ea7ef3910a7a28d1c40e9eca6e4eda165950fe145d04412ed4d2661bdf88929155ef505dcbc0fae565a5cf78