Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
bf4a1e6caf1b75cb91e9100908160e97_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf4a1e6caf1b75cb91e9100908160e97_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf4a1e6caf1b75cb91e9100908160e97_JaffaCakes118.html
-
Size
43KB
-
MD5
bf4a1e6caf1b75cb91e9100908160e97
-
SHA1
5bb208f6c90623d108abf4bd9adbf4fdbc5ddeb9
-
SHA256
579d41145e2dded659637bc09f9a8111519cefc3c5cc3c4691c01b3225813bd4
-
SHA512
255844627cb41b177b7518d8d7a34a9ebff040db0448093e8e10fbea4327681c87720a8eba57c5cf2c9ed1f5d670e02db78b40e64eaf8b085ec0bc9596b8492f
-
SSDEEP
768:tCTl9aZJuf/r6qUMxUlMaYG3I5LwZ0zTWDm+hsiU7hMTiyhhpI/+BJ715FN:tCTl9aZJo/rdzUlMaYG3I5LwZ0ziDm+/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3684 msedge.exe 3684 msedge.exe 1936 identity_helper.exe 1936 identity_helper.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe 3684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3684 wrote to memory of 1060 3684 msedge.exe 84 PID 3684 wrote to memory of 1060 3684 msedge.exe 84 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 4568 3684 msedge.exe 85 PID 3684 wrote to memory of 3020 3684 msedge.exe 86 PID 3684 wrote to memory of 3020 3684 msedge.exe 86 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87 PID 3684 wrote to memory of 2264 3684 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf4a1e6caf1b75cb91e9100908160e97_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b7ca46f8,0x7ff8b7ca4708,0x7ff8b7ca47182⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2810173613604518757,1181835726918240593,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
342B
MD558e50b16957eaba1b0433d7c259bd628
SHA1a8b3a0a75a6ad87b7ab76e1c865b1b68c75500a5
SHA25632a0337ffdd2e3642a57cb88632d06fd2088d889e565ebe21fbc643dcd59888a
SHA512750402a33e8ec6d8ec11ccd38baa5d47976a78817803a61c0f7ff2d34ce90aa65b5bb232a4aaccffce94142310611a417e0025b97ab54e4cb7eaebfd198cc06d
-
Filesize
5KB
MD51d63261307f454fff3ea8e3251c544fe
SHA1f077a244a2d25afc3e75abae570a87ccb777871c
SHA256b739a14bb839544607cc2e816025b83f39ca5ad1057154e0a9d780bcaf403670
SHA512db62cb9341a5a7fe7222f3af4ff92bd9ec10af600499fe5401249a1d83aea7061535bb92dd236c4fa2d9e76de60afc9091fe4ad07f9e44578ad48d6a34afef03
-
Filesize
6KB
MD52194e5d7beb12159eccd5d59f693ff95
SHA1810bab948464dde7234620eb419a68494fb06ed2
SHA2562fe1922a13335a619664c11bde92be9a4fd09477da41001f45a7b73f75c6efae
SHA5126f55410c09fcf427d66ac28f5114dfdacb495408f28aad084736f93c62d7c4114a0e63fd1b01d1c6f6b32dfc251d2356ddbdc849c228e5261f36ee6dd575bac7
-
Filesize
6KB
MD521ae707bf041f5a79b46cdf2dac5c605
SHA1da65e8b47063fa195b45c973a18f5b7c41d82a3d
SHA256a43190e403d52c197111d735cac34fa5f716685de4221c1c228f3bf7d3001359
SHA512670fbb593957e387ceb37875c3a10b1ad3ca145c3233ea84c36739341d3336d7d425db5af637842c87b5ec4eeedb2e62bab6d733166ee508d9aa730528c6be4e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ec5c574ff3d133fcbe0ca3b1dfb7d925
SHA1708999c7187dd9a741b6a926ee923ec4fe338df1
SHA25686af6a2f379374c26b5d467c52f3e90f1b406d6085f4e0c9e4f122d74eb98c75
SHA51264a89b114214545fea0585eda0c694d805ba26a551d8551561fba59856e60f84be28a14f6fa6d3dfeddf64500ebf299ef57129ec1ed097bd658afd43e09e2f2d