Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
8c133bf9d61b984b745afbf1bf131351_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c133bf9d61b984b745afbf1bf131351_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8c133bf9d61b984b745afbf1bf131351_JaffaCakes118.html
-
Size
3KB
-
MD5
8c133bf9d61b984b745afbf1bf131351
-
SHA1
a5c1539fb484d8120bc8a6a0a09dcc38253ccbb2
-
SHA256
fc4155f5ec02df3e11c4fbf7c813b4461c4e5133a41cfe87e1d4aa96d933a667
-
SHA512
c211e05833dead6447454eb6e1f595d1953e395bf59c7067be51605765c461c997120bd41db70cc4b179983ba3f82ac66ddf2b7abbd2f51cdd66fed8cdff4cbf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 680 msedge.exe 680 msedge.exe 3104 identity_helper.exe 3104 identity_helper.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 4668 680 msedge.exe 82 PID 680 wrote to memory of 4668 680 msedge.exe 82 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2236 680 msedge.exe 83 PID 680 wrote to memory of 2940 680 msedge.exe 84 PID 680 wrote to memory of 2940 680 msedge.exe 84 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85 PID 680 wrote to memory of 3980 680 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c133bf9d61b984b745afbf1bf131351_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,5757538879454392104,8959805363878715939,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD501545562cde667328983bb77f1498c6e
SHA1f2a9cc20d4f6b849bd7ae1fc053b43c8f7dd57b6
SHA25614a8166204d997eb5c2eb0335a22c9736ad8740eadab1e5ff12f97f54a0a0eac
SHA5128e252b5aa4506ed0984d362e6cae89c4337b639772382b46597574d9ff19b06aa679bbf91fd20a2d50fb3c44f0e80f6fe4ff156e04b1fb8514c349817cee6617
-
Filesize
6KB
MD5e225a1f559bf296364f24f4e739e65da
SHA189d7917b9f029786ce1c740617c0c5804dfa1396
SHA256f494822a6c026748e530394b700dc8130bbab1585e0417e72ffc526f1962e7e2
SHA5124c7a707377bba723bdc95c0b7c485d81572066e7a4b07710020387f84002563fe8c48610a80ad2f90053261cdb8af21cdcd1205facb2bb06e94a93598b22745c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ffc1f507f538db55ea41790aedf84712
SHA100391502abffcee0de87ce32a8c9be0adcac8d2c
SHA2566a12da258f5363f05eb318e2e14e415a06220e85f6ee18d035ab287da912a5c5
SHA5126ac083ea24a19b9bd3acb8b64accfabc58485d9f2ae5ffe7b4d5f1636c87ee29f9ededa6a3b6c25b8ce352555011a01af5a7a28c136a89234818bc4a15102dfc