Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
8115f4c663083a0be8530369fb731b32_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8115f4c663083a0be8530369fb731b32_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8115f4c663083a0be8530369fb731b32_JaffaCakes118.html
-
Size
481KB
-
MD5
8115f4c663083a0be8530369fb731b32
-
SHA1
50682e5671176ff8e094b2cf89dc169343ad1987
-
SHA256
a700a51afa5d581c7093416140da1d36dadbca44fa46eecf2573e39e00248b52
-
SHA512
4f8ad96c0bd49c60716ba33c092c5fc59578b7dc21ddb95e8ef7c411f89895d93121ce2e0d9361624624130d54b1e46515cbe0d41df2744fa4087dab0ef88886
-
SSDEEP
6144:SCnsMYod+X3oI+Y+sMYod+X3oI+YXsMYod+X3oI+Y+sMYod+X3oI+YQ:pL5d+X3K5d+X3l5d+X3O5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 1596 msedge.exe 1596 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3856 1596 msedge.exe 82 PID 1596 wrote to memory of 3856 1596 msedge.exe 82 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 736 1596 msedge.exe 83 PID 1596 wrote to memory of 4500 1596 msedge.exe 84 PID 1596 wrote to memory of 4500 1596 msedge.exe 84 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85 PID 1596 wrote to memory of 4884 1596 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8115f4c663083a0be8530369fb731b32_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b3c846f8,0x7ff9b3c84708,0x7ff9b3c847182⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,503505695875212117,17775833378293683172,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5562d3ed1003c415326323017df49cb7e
SHA19fdb0464daffc275e56be2f39d0c8077c7fff1a5
SHA256a186c13d5501d8a264c6ee69ec5dbc72ff58c1e4f563d2cea5e1de14f7d5f560
SHA512bb8906280b9cccba724739387cd65bbb481d903c67d46ccb3c1c803b34f25c9a8b699a022b9aeaae43cef9e13d4c36981d94254764adc9b4815ad0d4485b9c63
-
Filesize
6KB
MD52ba66339fdd5cb191b1c6db1f6553ab1
SHA1a636c650a28fe0c708432c44fe4b781c5eb08d6e
SHA256c575aead48c50e8189da0dab0a2336af03f0f0e1f03a8a1edc54e4a2c6133335
SHA5129cff3ec0ad7448bce08ea0526a34aa163f5ce3e9f00c89b1818dc027054aa5d608177f58ccb0b22a21248d9ffe9c0a5a9c8e965a6e144f4b20b65172dbe8ee0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52c8ca31082dabd0d92d16bc73e054f39
SHA1b83556a3935621d84a85054d1d3f842b9566ede6
SHA25604ca1fb3535521fe4c6a1ac7aa7b9649286d99090014bbfe3d05e60b0612d93b
SHA512d499719a2f5c2dc67eb4ff84c1550a1100002d301ae6ef813c953d6c9cda6e3cb3e88e5d4231743edebdee05c2d9b439fc0d65a282d2f78e51fa8a2a5424692e