Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
8648b3b1cba18670e3c7d06c56fcbb12_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8648b3b1cba18670e3c7d06c56fcbb12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8648b3b1cba18670e3c7d06c56fcbb12_JaffaCakes118.html
-
Size
115KB
-
MD5
8648b3b1cba18670e3c7d06c56fcbb12
-
SHA1
14888e83497bb5a7fc0f958f5bd124fe70826a0e
-
SHA256
56d7c190899efcdc68ccbf8b58b1339f56506f9f7c259cbed45e76fa6f5fd2cc
-
SHA512
d2ba9c5c920b4786e5a57674112027e4886e6be5336f285be1823635db450c85a29952d565360851c9c8d32e9afd741d02405345b3a9fc2be036de956e690b7e
-
SSDEEP
1536:SSryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:SSryfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3180 msedge.exe 3180 msedge.exe 264 msedge.exe 264 msedge.exe 4620 identity_helper.exe 4620 identity_helper.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 264 wrote to memory of 208 264 msedge.exe msedge.exe PID 264 wrote to memory of 208 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3952 264 msedge.exe msedge.exe PID 264 wrote to memory of 3180 264 msedge.exe msedge.exe PID 264 wrote to memory of 3180 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe PID 264 wrote to memory of 1404 264 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8648b3b1cba18670e3c7d06c56fcbb12_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10723437877077335446,17216011600893409232,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5157ebdbcd455cbf48753257f32a6621e
SHA140380508d8f1fd71f87829e3ff326701ce19af82
SHA25664fd0d8a7517ddd3e44dd7a175d815067d809d8ed85f52ad07856be06a778f33
SHA512d43a1ab2b1290decb91985be330494686cffddf7861d2215ceb5db1e882b5c616e6172c602c08af4bc5342aebc92dc0bd75fcae461dfd42f392afe5f285a0b68
-
Filesize
6KB
MD54555e1b5a4d38765ea97f2c3a9a90e7f
SHA1db5e5999000a719c65d57854d1f60997b6714cf5
SHA256c7e0b1765f271e1a3f6af41ebe2dc3f13fdb65108186ab18858ac6d2e7db9a0f
SHA512701d95fbd345833f7ed2db4f22049c1fcde84d6631b38008a4f4ed3e760f3fa64f3d85b8d1cd496161844024964653053ecd013964a991daaf3ad7385d98e7e3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD53685623272bc78fe79e2fcbf2ba81b28
SHA1b30fb2e9b7c2bb8b2443100f378b0d8c042550c1
SHA2563b270fba0fa6b89ce8947f0114ef29a082a43cad79b03667bb253f4913494c78
SHA5121702cf7398543b409fbf7146320153196eaacddc21cc9d4d4bfe506480bfbe5a08e4ba35b7b1a9e4eafee7d6127b50560946bf277d79c0a72fa5d4a7247cfb9b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e