Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html
-
Size
18KB
-
MD5
8341fdd7806d9ba222aea6b7bc6042b1
-
SHA1
7e1d2d5133d7d820af8f6faf663c5d102c49a7c7
-
SHA256
787b9ccc3c2887244b70acd8df69272f384bddefff915060f185f66664212049
-
SHA512
f226ed142a74b7766f098be4c4ec09b614acb9e48bedac636c5a8f5bce5cef1459683541559f1027b1045877a7d2d1511c8d5938be5845464bc5276c963234e2
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI/QEUyO4Am22Mutk7/zUnjBh4/w582qDB8:SIMd0I5nO9H3svclxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 1516 msedge.exe 1516 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 3540 1516 msedge.exe 82 PID 1516 wrote to memory of 3540 1516 msedge.exe 82 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 1772 1516 msedge.exe 83 PID 1516 wrote to memory of 4816 1516 msedge.exe 84 PID 1516 wrote to memory of 4816 1516 msedge.exe 84 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85 PID 1516 wrote to memory of 3856 1516 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8341fdd7806d9ba222aea6b7bc6042b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b3546f8,0x7ffc0b354708,0x7ffc0b3547182⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,10540182703402386540,705826669963150386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,10540182703402386540,705826669963150386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,10540182703402386540,705826669963150386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10540182703402386540,705826669963150386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10540182703402386540,705826669963150386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,10540182703402386540,705826669963150386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58c8d02ddb4367c490044dbc77ba71aac
SHA1c2170de98f212c5f9acdbf00dcbdca66323c3b7c
SHA256643f84e8af4df3d440ed9f36fd4d2a8231f0953debe34bc3c57ffc572183994e
SHA5125a499442c42df15c911f5e6c72bcd052c4a195955b8a6289794892fef0de39e4ec7790900f4883eaf315911b03373aa841566c2ff7ee8ec80b52bd5f081c8b6f
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD555db2e96bb970485e5ab0b8dfb93958a
SHA1136a862757b2bba8ab7feaec9a0187c15e089e9a
SHA256668ce897d88852680d9fd826fcd04f6504180d07e4ca2bfb991ce530854b403f
SHA5125f4e280a9e58ac336dd4e7cc279c0618c4dac334f446d3cfb0e6341fbf4fa0c95833a778ff6df353786e972fff0e1d8d670cfd736feb6c2cd2e720a98185c493
-
Filesize
5KB
MD550077cdd844572cd561c933e3439f2db
SHA193da63d6b5f25f7b446ffa9b2ab9d3438c41d1a0
SHA256a1121560f696d3eac8b7fb20e8e7ff5a50b6dd06afd770c15e6f3bda267ae442
SHA512a19a0d08c3f3b40d1a2270ef71f21cf410121429a349a68e77898d479ac8cb7350f3f5820b3bb92ab4db79431ed4e696e8285177976bd906da2b229211cd139a
-
Filesize
6KB
MD52cc9a62a1b650e814e57d96eb9bff19f
SHA1bfffa98fcd2d4feff4ba9a72e7d112320aa7a399
SHA256f12177dae9a0a0317947987515d2ac401085a35ecc86ee3527ee0856e6340527
SHA5127aaa7d07ae3f9fb471998e19bf21e5cac0c855880e35b0e07f2b34e9f45cdc5cb1952727b33416ae0575f82581ec864d7579e2c577ac7ec294c02f23b6e45934