Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html
-
Size
20KB
-
MD5
bf04ee44f1f87889336ab3cf9b794a04
-
SHA1
6739f020436d7cef28b4a094d834046a8356e43c
-
SHA256
a9a6cde01546df8190acd11dc679114c8f8f22f52c9b5650f3c82bad1b68ef45
-
SHA512
c2fc928fc8ec928119f098849dddb7dad5df58aa030455e5dc4bc483121038d1b924ff6f9e683101b1765cba5bf19100150271058c6c9fc265ddf6447eda48bd
-
SSDEEP
384:SIu5ijYwdcBvN8IOB/ugkjsfKnIUl1l9TMadMkSOivyJhdp4g4Y/gU0C7B17/fkL:SIYwdcBvN8IOB/u3jsfKnIUl1l9TMadW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 888 msedge.exe 888 msedge.exe 836 msedge.exe 836 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 836 msedge.exe 836 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 836 wrote to memory of 3532 836 msedge.exe 84 PID 836 wrote to memory of 3532 836 msedge.exe 84 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 4568 836 msedge.exe 85 PID 836 wrote to memory of 888 836 msedge.exe 86 PID 836 wrote to memory of 888 836 msedge.exe 86 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87 PID 836 wrote to memory of 2756 836 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ebfd46f8,0x7ff8ebfd4708,0x7ff8ebfd47182⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7657079724949817593,11816282396049915846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,7657079724949817593,11816282396049915846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,7657079724949817593,11816282396049915846,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7657079724949817593,11816282396049915846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7657079724949817593,11816282396049915846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7657079724949817593,11816282396049915846,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD56866c0e5a0a119e414d07dcb3b017a64
SHA176ec8a5f1185f463ede6947ae131337c6504c20a
SHA25641c8a98617701bdada97992f8fa12c3ea4f9b2aef754ad1c5c56bf2c2e342840
SHA5127acb961e41dc90cacd911cec1dccdd74948ed2131915a7d0d2db1737033d17f0a1e52258d2fd533dbbc67cc2bb405a4969ee25b3055b36b4ab5c78d31514d1df
-
Filesize
6KB
MD582f22805aaa5091918a51ac462dc69ba
SHA1d37beb054dc6d40c39a60e4904a44033aba066af
SHA256df88f222fd87619c9c64114f2da1eaaffb29955303c2443bedba4c1e04834c94
SHA512a1a47da38796b84049ea027d05c3d827b41431e0d2b4019c439d7868fdc63ec5ba16edd452bc34f11ce50fd920e7f0cd05e5276e1194f1208674cdef5194a4fc
-
Filesize
6KB
MD565d601f455987f3da3775c76dff78204
SHA1a47a0efe6d2c6ca9a526325d6a20a870141dfdf0
SHA2569f21a11eb8f051cfba94f4cfe955e6310ab1ce8c2ff5ac01431fcb0327984ee7
SHA512f920f57afc28ab3e9907f200be9e0d3830cc8d784b8107492420c0756c4797ec8ef2d05bfb485fe4eaafebf076dd98987223a09692100260cbe4dcaf61e4eae9
-
Filesize
10KB
MD5e78a9ec2b6ad9e70591628e966bdd7c1
SHA1bc12166d18e3d312f1ff2b11d86a817153985b92
SHA2569924462eebb1b13dd5ca3df3a6b93ceb788fde28930d638785d7573e80798c1f
SHA512b6c5a8158396c4d260a6bbab69662bb805deeae16cc632393d056f8cd49630b12289da6954bcb227e3bf6a42c48524699d7edf93e8adf19c1b7c441986db0df1