Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
bff240bb5873c22561a6fc3bd0fc63bd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bff240bb5873c22561a6fc3bd0fc63bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bff240bb5873c22561a6fc3bd0fc63bd_JaffaCakes118.html
-
Size
135KB
-
MD5
bff240bb5873c22561a6fc3bd0fc63bd
-
SHA1
7debabd1689986cf788ad0d892bd463560e72b2c
-
SHA256
00b0643e7f4facc28d8a927ef699f76dc70fb9573db99c099f3b8070060d76a0
-
SHA512
eeffaff63736e2f9afa1a4d03f3f138ede4bd29b974f20824d8de4178facbaa8bbd2bab65871d07a77591c1fa4ebab3fbd00272c9962b988aa95361ffc4a6f19
-
SSDEEP
3072:i5FmPTpnFJiIfN/KT8LRE2cynGCH1hUzGO4vu:iPmPT5+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2040 msedge.exe 2040 msedge.exe 872 identity_helper.exe 872 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4064 2040 msedge.exe 85 PID 2040 wrote to memory of 4064 2040 msedge.exe 85 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 3380 2040 msedge.exe 86 PID 2040 wrote to memory of 2668 2040 msedge.exe 87 PID 2040 wrote to memory of 2668 2040 msedge.exe 87 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88 PID 2040 wrote to memory of 3252 2040 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bff240bb5873c22561a6fc3bd0fc63bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffcd83a46f8,0x7ffcd83a4708,0x7ffcd83a47182⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1944 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10226413083157201143,10959710710308385335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
954B
MD5f5bdc4b4b4e012f3b85eff29dc9ee26b
SHA1683441b7a1ec6499e6047e17e4568ebeb0a85869
SHA2569584bd8265ccf2dda109d9c65cf00f476c01ea0e59d2bdc496264310e17637d0
SHA5125deabc8bb419f1b6de5b8e827b60937e16150c7cfe6261ee089809f42fccfdb9186da870a606e8ba540008c8d0fdd3c2f06b7860a2f0bec0d134c8c5194ce895
-
Filesize
5KB
MD57216a04f904e24af502b7b4ac4ea0b71
SHA1948243cc2d8a8ecdf1e24fa9723a67183abff764
SHA2567258c6b328f989b93db5c5947d158751777540071549d1fb0490757776550f4c
SHA512b9caf24e04f0e3c5e4b3d9e62be2675eb2324c2c500b7b930c33bbf6422e96d13ff7bade3ba86a86991b137bf561af3568a5d33337cb6330d2ee11afbbdc400e
-
Filesize
6KB
MD57c4b8d401edfd1ba32d655ab1b371fee
SHA1d05a5b3e3a3ef573009bfbc7d31a272e279ba10e
SHA2561d3597585f48e9de9f652b14e3d56fa391742ef5ae34fe6e6953f24678a0a371
SHA512fc80c5e26f1eefd9dce24bf39f52ec1152f8a7d07a2569eb6eec40f98082c05cebdcbf21174db56214fbf1d79ed59a0aaafda587b120c616c0cc5258e1847879
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD576bbe5ad3e0797c990a76201c8c61f64
SHA190d6f62a92725910bc34f6f291c6d0745aeec210
SHA25605ca2066755ed68d0bafce0d90a2dd574ec85975373720228234c2ee61e1e6ab
SHA512cb7c911edec7eda25f5d28e57f3ff568dc91c6a472f7657193bfae1e02b6d60e1696edddf72a33b8669854e905bfe72f6b455540295c33f05fb0f6d496c2028e