Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html
-
Size
4KB
-
MD5
8667c4cf3cdeed23c7c80466032ee833
-
SHA1
b0ed30ab3385b45f47f289f457eb1055f3d3486e
-
SHA256
e1fbc71f7b58326e386ed3b3005bb7644c7fbc21549178a91749f2e5e83d96e4
-
SHA512
b9b64a5ceecc0d2f9bef07cae4c5ad534c9f1cb1ec28a2b1efae1b1d7a26be7870075d2c646d6834469fab688b782d48dee1a917439af13c2932eeb322f3f7c0
-
SSDEEP
96:Pk7hJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oMd:Pk7hY1aEFHVKtF37sNjtXATIQFM93pDj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 972 msedge.exe 972 msedge.exe 2044 msedge.exe 2044 msedge.exe 2004 identity_helper.exe 2004 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2892 2044 msedge.exe 82 PID 2044 wrote to memory of 2892 2044 msedge.exe 82 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 2876 2044 msedge.exe 83 PID 2044 wrote to memory of 972 2044 msedge.exe 84 PID 2044 wrote to memory of 972 2044 msedge.exe 84 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85 PID 2044 wrote to memory of 3436 2044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95aae46f8,0x7ff95aae4708,0x7ff95aae47182⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11643664371899291867,11394760711323205861,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\72a9ec7e-cc65-4a68-a4f1-4c4c933316ae.tmp
Filesize5KB
MD579f74669adbb60b8978b70ef4cdf4900
SHA18a45875c2973c77cd746a088c60a7bfdb655b00e
SHA2566a2fbea07c91149968dca970e4eda29bc242556cdf1b275690e29cc501eaee9c
SHA5123dc462fa0ede3875ffd1abff557f238303d83a146c9a001a20c80358afeb2116d7cf1a644652f8a2cb2763507e7d155a023f4e189ea0209cd8f2691b82e88163
-
Filesize
291B
MD5b4fbc7209eaffd276102dc410f89e64c
SHA138a1a1ca2304af3038b88ca17fa9fb03cfff20fd
SHA256a4a586c5bbcc377f139f5d7e656889fc5e428a362e86e006970dc919d8631f68
SHA512f4470753f03cd66a550a0290bcbd9b7bf72f56929891531c958668421176ca18e04c76d575f154f94bf4291ca026dac8b7239e9553d08baa548b8b8d440fcf99
-
Filesize
6KB
MD57005bb21e8d47b8769ee09cfd22be49d
SHA1efe1ccbbab26e2ceaff5ddef22bbb53ae36c9ef5
SHA2561f2a9fc4a155c7a0b62312027444907a50efc81dee6913b27b66787d47b01536
SHA5122201332d31258e2a2c4fb5cc0db004bb8e16409b2efb0fe454d09f545eb6bf346ba5224bdcc30efeeffd9988c2fd5fa243ba1392e6f5865f521b5aeeecd39c5c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5685bed82350522981a905eea1bc5f6ee
SHA1cffb086b0ddc6ecfd2f44456487aa42fe1698ac7
SHA2566d1e5a691a8cc3ed7d2b190a777a2e947451dd086e50f9f009ab689a2b9b1322
SHA512599032a14edbaa933722121041a819cb091f1c9e3fc1f9208c4da4aa2ba9365c4a10acb61656fc3cab2da1150c0b816687b6498094d225a0e4238d7997915d04