Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
bfa2de04bc0dea2937af75f033b49817_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfa2de04bc0dea2937af75f033b49817_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfa2de04bc0dea2937af75f033b49817_JaffaCakes118.html
-
Size
52KB
-
MD5
bfa2de04bc0dea2937af75f033b49817
-
SHA1
a41477cfd2fdf9c35b291876f08605d371ec1dcb
-
SHA256
d8f36431d19471e929b08d22c2310a4c0203b29450b89e65a9e9dd8c6b1e67b8
-
SHA512
08779716143e0039a52ad5d2ec0acdb5c12fd1e58f8b60b63e84efc65cb4984bb192ae4a52057e1d09a18cac50ec1342481a295d20ee0f1e4381302348beed49
-
SSDEEP
1536:RAdi8yKEolfEFLG78n74iYqdPqiqPqoqpq1OufM2AFt8TdAaQwqXxWL5/8yH:SDEFLf78qF1yr9qXxWLB8E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 4764 msedge.exe 4764 msedge.exe 4268 identity_helper.exe 4268 identity_helper.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 5084 4764 msedge.exe 84 PID 4764 wrote to memory of 5084 4764 msedge.exe 84 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 5076 4764 msedge.exe 85 PID 4764 wrote to memory of 3364 4764 msedge.exe 86 PID 4764 wrote to memory of 3364 4764 msedge.exe 86 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87 PID 4764 wrote to memory of 3656 4764 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bfa2de04bc0dea2937af75f033b49817_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffade5446f8,0x7ffade544708,0x7ffade5447182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1872 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2736 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7555275511340749728,13503281444114368332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
630B
MD50e54375c3ce391dfd1078f8a0afe04d1
SHA1771288f1be13f1a3eb0cbaecc293396a76bf0890
SHA256344a3e55adf0c37b090ad4e5c76c31c9bdcec6123939d1514bb279c426c5c964
SHA512c65424b1e900e2dc87f9e7475edfbe0df9c7ffc4b3a87389d516f06112b2842ad9cc0c2ef9fd3d5c47ca903295c2c7a927ed70d2f2cb7da208048f715f152b44
-
Filesize
5KB
MD5c24c95d7d676fc14124276283c6c9f10
SHA17ff08c5729105b019b3e58f68bd13311432afeb9
SHA256e8a1da4b1005c581792e32048efebb4b595e45c54c3a0f1508c0f9f39807764b
SHA512b4a454add8154ae4ba56f3b91fccc79a2433e2dd7713edaa3e4274321eb8d91bb26a196082586bba3c0cb1f6b22ce1d9c2c6a94e7c49c799a9267b44f216f7a6
-
Filesize
6KB
MD57202322b096699c50cf664b38aa35ad0
SHA15d4d12eb1e0b74192acebdd9a4df91686ae86b64
SHA256be99a623fbd3fd05ec8d616c2fbbfcfe65a10e4b0c0d43b0d8913183ba8a78b1
SHA5124de9afcd559f6758444231dc6e91a0002cdb654eafc0a5d8f9cab62041ecb7f8e9bf9df8b55b9224bd306233fff48ff2315461b615f1369fabf433e70c02ef0f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b7d61507b38ea4589a6bdfac66f35ca
SHA1ae7378cf9c4be53a812c38d6270bdca55b008f49
SHA256615a667c5abc5a70c058ea9cb73a56a99a0442be6c2ad661aaba922d2348856a
SHA512c99b8e595293ec488f7794ccfb8b45aa41e905fef4515ef3dec8c1ae13f6e74c9648d2ccdf2f348ba95a117c6a297a5836e639217ff04327714482b74d69003c