Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
8366dbd63ac84f2fc9e9001719299dca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8366dbd63ac84f2fc9e9001719299dca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8366dbd63ac84f2fc9e9001719299dca_JaffaCakes118.html
-
Size
133KB
-
MD5
8366dbd63ac84f2fc9e9001719299dca
-
SHA1
a836bfafb0e76405194ce65af67eb806a209b37c
-
SHA256
4cf332784fa909f5d9156033ada74daeb55bceee69297caaa5faff68e6344975
-
SHA512
3b7be5306d4b3cf46cda36621230d9a0c5c94f002771dd20e4f66a9f2346edf7feee3ef5f883e9f84748f8dbade944e66e9d85666efa9bb17541a2c0ef73934b
-
SSDEEP
1536:yMJu+IWjILUbllBBttTTqq8QLfScO/JWpCCrlCXg5lxX25LnXyDnwXCM4G5xWNcH:9u+IW2QKjFj+aRxBoW63i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 4160 msedge.exe 4160 msedge.exe 4184 identity_helper.exe 4184 identity_helper.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1492 4160 msedge.exe 83 PID 4160 wrote to memory of 1492 4160 msedge.exe 83 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 1436 4160 msedge.exe 84 PID 4160 wrote to memory of 3700 4160 msedge.exe 85 PID 4160 wrote to memory of 3700 4160 msedge.exe 85 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86 PID 4160 wrote to memory of 4824 4160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8366dbd63ac84f2fc9e9001719299dca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9915032127959298376,12344362689653275335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD55c086f769d009d005f9a42c6d96ca046
SHA1536b5ea056cc77527a647d76b654c1db9148a3c1
SHA256a6885b686507db4038757f5c0d38bdef36fb0b2991dcb18ae6a5eecce6906e20
SHA5125518b8b821165b5c2742c1d0d01c929eb7bc9028e58a05ab6e47357e12da322960a74cad8bea238988adf3295fe2a86888d11abe645d77b50dbb7efbfdab0e46
-
Filesize
6KB
MD598d774e8a6e951b0ce37837913696bee
SHA1b166e4442b3d7003ca7aa3b16413ff68c320338a
SHA2565c642fa34c6ee7bb5df8ca315019452f2801fa4cda8d4d6e2231b54202dadf8b
SHA512ce473966e9198cefbbfd4f295387f8363345f88c647cd532e2730c6343105c37bbfeeb994708001b1f1511f412da2226ff1d1c7a94591c46180f63bd1f78ef10
-
Filesize
6KB
MD594c5d1ccecdf59a6ffbba8630c33ad75
SHA1f6d7b1e2d32c87c57331ae38daa48ad8cc2f1bb5
SHA2565b99171ca20a0892f720b3792a8e936c54fe9f0b5beabbbf2545a967aa01fec9
SHA5121d7ffc16b64bbc6892470bcafc489baa87b849607bb9f05a4053e1da69e06938264c1990a8ba2433cfbc581b874008423384cb8546f508f141701cd46cd4a3de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bea9e8dc1e6bea83957b30fdbd15bae8
SHA18014d5bca2fb7184afe80482015e7e44ff791418
SHA256083137644e6349b6a0e3f539463092cc6f6b5a0be00eaa485260142d211daf40
SHA5124eb83c2dd21c740aaa7a05d0db70eecf48c8843a31c55c0ac86f7df99e279f94c4abd53a4de9c7a3f8e18ab6fb9d62315e8ebb924e4c7da73c35c2dadbcae691