Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
bf2da36772568a77be2a61ea90edd0cf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf2da36772568a77be2a61ea90edd0cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf2da36772568a77be2a61ea90edd0cf_JaffaCakes118.html
-
Size
3KB
-
MD5
bf2da36772568a77be2a61ea90edd0cf
-
SHA1
0f6af50720b75f96486bfc34a9916ef1866409fd
-
SHA256
fcd2b67e228d6f7197ed5b3a10fae01809dc4c2146ed4f0a0ca8492a0064451f
-
SHA512
84f1e6a1069a0aa4c5e142e6a07d69030d64ec6b954cc6303398188234b2d5d87c372845555b9de0a4abc91fd64cdc695a881582c95c2b10045a793a04a447f7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 5044 msedge.exe 5044 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4620 5044 msedge.exe 84 PID 5044 wrote to memory of 4620 5044 msedge.exe 84 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 2000 5044 msedge.exe 85 PID 5044 wrote to memory of 4448 5044 msedge.exe 86 PID 5044 wrote to memory of 4448 5044 msedge.exe 86 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87 PID 5044 wrote to memory of 2032 5044 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf2da36772568a77be2a61ea90edd0cf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff0d9e46f8,0x7fff0d9e4708,0x7fff0d9e47182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,18431620212084125007,2332374331298880349,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD5d9085e85f3ad1f729b283c0f283a611d
SHA19f058d9a4b2aa7292721ceb53d7ebd3e366e88dd
SHA2568beb98760499a0528d8d562f7052150e113de2bcef814d50a5affa61cc8d2f0d
SHA512511b1db2cde39de394aea80c88bb1e9cbbbe5e8ac797426305f7dbfae2dd8053a0e99c89c64a3599f505b556804510310c2ddab6183d727c65e16404b748c65e
-
Filesize
6KB
MD56c6490e06de1a5a681da82ef2af8939b
SHA181133fd1c8db8f6c21fd4d780b7cc0ab7470e00e
SHA25612c71248c6f171e14ae5a8ca881daa2a5ccd08f52ee3aca6fe0d0531f6311bc7
SHA5127c38969a9bd1d43a758c444f31fdee603566a081dea56fd050d757aeb79e32b0427a6b3242cebb27d3bc636242d0ecfb765a885022a5b2b4822b64d6cedf14db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51c8716d7eb6f1064397146e86324cf95
SHA13429fd8c67681788f4e6cdb82ecdfdb55b3ab4e2
SHA2563a0531b39caee645ead16f7e9ae008d902ab96d5fae67bc6500470d19dca8f62
SHA512cab230036b118bd7fbc9e784551d42fb026bbb174e818d9952e16a1c9900fd3295a62f9b98573a0ded9c2bdc430ad66846e1538cc11ca05c3b30e3ab949d92a7