Analysis
-
max time kernel
107s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html
-
Size
52KB
-
MD5
bf9f3f83cfaba7d1d2305d0fcc8f8370
-
SHA1
e2251544d9c95c03b98a29a3d23f946fb5fe305a
-
SHA256
2206a21b90b426f59fa4988543ed13616c0a4ff07c7f690f5acd454e80075b40
-
SHA512
6dcdece57fcf431992b41821137c0093a5626078860c2bef265d6240c2cc60e3b8004877613ccc1258a25798de00c0ff6540006d6e60749988523bdc964b4e3c
-
SSDEEP
1536:Ab3zZ+Oe5n0ghNxgefN3MU39DMglNJfXwJ0:6IOe50geefR9Dt+J0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 4580 msedge.exe 4580 msedge.exe 3616 identity_helper.exe 3616 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 788 4580 msedge.exe 84 PID 4580 wrote to memory of 788 4580 msedge.exe 84 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1900 4580 msedge.exe 85 PID 4580 wrote to memory of 1016 4580 msedge.exe 86 PID 4580 wrote to memory of 1016 4580 msedge.exe 86 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87 PID 4580 wrote to memory of 5072 4580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe2f46f8,0x7ffdbe2f4708,0x7ffdbe2f47182⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14025637436109006874,800469729761666905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
465B
MD5e0a1b50a7f22a44222d70f950a31ccb1
SHA10d4f33866e5e16ddc8c8a579b808d03c29ee733b
SHA256db123b2109cb40f98d348dc62230c69a68b38a3d38d82a29884505896c4976d4
SHA512c45ad8e81a4479df9c0dda0cd5c1e21d779b451185f5271be07ef51eccd29751ec0f0c20a82bdf95b2b133340eca6ca99a3fe93eecc23b18d9c0642dd54bead7
-
Filesize
5KB
MD57058bcff672a4f94746853314e45063f
SHA1df5f99bf5967d68415721edc0ae40643cd8d067c
SHA256a9c428c16d31e8816abfd6b48fd83591653d5efff512f413102556b57daebbb5
SHA51296aed7b910dc298f571470c343940718ca68e595504e358434b9d8e42ea843d4900a199a0647132bc15c98133c8e5e472d650208942796a9eafab6924604ac04
-
Filesize
6KB
MD592a2e4bff5b466fb747f06d9910551c0
SHA146888f7c0e7b3f954cae287eef130d41149a1ffe
SHA256eff00f2e45ed0df33e9b438545a8fc8531a11b1ea9df375ed79123cc92bf0b45
SHA5125ee3c236f5dd492b316aa4fd938324dcd399f610ff5aa1f8d030edc2ee94eb37ba34b52eebe8382081562fb0de894f9cb9e44ebd774b3adc8383c7f465e8f0b1
-
Filesize
6KB
MD56c4e09023f37227b9e489bef4dc69f77
SHA1f1d568d30e3ca873210b13b19dc58b73886b23f7
SHA2566738e3d04ff66dc95af67682e9426914033234d7da34096ca8f3a82e741d3271
SHA512e6dd977962e25b28b9cc4f772cf34ef808ed6aded3e391577b9c6c45d6bf06adae79dd29c4841731cb5974fc9bb2196f4c6a08f19bc9ec8447b78a6552f2826c
-
Filesize
6KB
MD5e0eca68abc32c973b7b70f3f33e32ae8
SHA15404f370f3b9f56e586f503417cf400fe06db715
SHA256d6e854828c05c440da5e592486f1597dce328bd99006dd7f0ab5842e2488dbb8
SHA5126d53b4968207a7f58f96ff449742af050795926a5e135d3e912af9fef84da7cf9b8522b1732de28173332f8520603b708f7a8ddac0b8910fc4d0ebac1b94ed44
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53db85722a1d6a29941eb1b206fa1c7f9
SHA1962d28f62a30cb90921ba746b6d275669528222e
SHA256f92463ab2894f0d98d44ce599582a8a4021076c665ce29ac275fea6d02028077
SHA512fecb6a26b8f779c9a4651b33bc4c425a3f4746fe2d8e26abb214f66e0a274d02fd350b12ae9ec02d4fbdaac6164cdd112068a9660b928534af21a5068986323a
-
Filesize
12KB
MD543abe2257a0378a8e88de7bac6fc0e5c
SHA146e15ad3906bf691760adb3dafd8ffad4b2af746
SHA256a9daf3300cc29502a4172d2922e413dbb89d80610a200f4d1ff1f1e31af8251e
SHA512792abd6e705f0395666591325921ec2e711b4f9cdfec567cf24fa8e8a04bdedcadd798cdfa006c3cdc6cdbc3a1e2ed64a52372a407771f292786b61b09737b5f