Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
8c3d2f433d427027b18254d4587ccc45_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8c3d2f433d427027b18254d4587ccc45_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8c3d2f433d427027b18254d4587ccc45_JaffaCakes118.html
-
Size
28KB
-
MD5
8c3d2f433d427027b18254d4587ccc45
-
SHA1
c508a0c1928c5ffd57fd0c26b97cec3992a6ed93
-
SHA256
f4555db39dd804531546ba725de074f2941b3437594f47d6c21c524974daa55b
-
SHA512
acf10b8f51c7440f8e94479be4ec66c1c3ac6b12e04f77f6c2f5c9c72252d54e90eb8cb74d786c45778009153f6bd0fb380a7251a12992027f9b9220949ca50c
-
SSDEEP
768:S2VdsFqvfkRlAVV1C5m1CCCcmzm3C/CnCQGrMibglz2:SOdsFqvfkc1C5m1CCCcmzm3C/CnCQNlC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 4872 msedge.exe 4872 msedge.exe 3864 identity_helper.exe 3864 identity_helper.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2388 4872 msedge.exe 82 PID 4872 wrote to memory of 2388 4872 msedge.exe 82 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 3040 4872 msedge.exe 83 PID 4872 wrote to memory of 2484 4872 msedge.exe 84 PID 4872 wrote to memory of 2484 4872 msedge.exe 84 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85 PID 4872 wrote to memory of 2956 4872 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c3d2f433d427027b18254d4587ccc45_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadca846f8,0x7ffadca84708,0x7ffadca847182⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12569337268797807831,16973021036461981358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD512239d2dbdd83c14563d985d5f7bbd22
SHA16346360da120cdcb4c867ca15e449a83d5cc5795
SHA25617e646b7016ed70b9fc223fe9afce36edec1b07760f6f66be9f001981425ddb4
SHA512e6228c69aad52736d4311f0bb944e0566528b0f94270222323b85ec522e56440622246308b93d8209bdcc0eacf0ec023b0cf11cb52934341ab247b7beaed4490
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
681B
MD57b7d8e949cd1342f597ecaaa53e2fd9c
SHA198d5213bc6011a70cdd607665f9aeba84de4e9b3
SHA2562e6628da8666650320cdee266a7a7c4cd32ea4a6b5bec2d19541bba2117b6531
SHA512844b468da33f171c5e50611ccb8dd54528b2b31667bc6c852883c334933355906c20dfe6b54b1483a5ae681095c8a1524f322f8fd31469c9768cc229016bd040
-
Filesize
5KB
MD5aded50b18c27e02afca4a18d138bace1
SHA1433f6849ef833008be16aab9d75ebbc98423f9d4
SHA256271c1e95622852ca9853ef350b7c0db59dd262c20eba907a89695c054dc079c2
SHA512f5d7d5adf51a7f33a4e5260a3a58fb8813dad8b689195ed05954ec54b500033894080249e53c51f2e49244eecb62a4d17b411ed505e17254cab4fc2502046e32
-
Filesize
6KB
MD5e635b79f9033d8ccd96a6629b88afe3d
SHA19abc8e26885e697a454f387f9a9816a69862c71b
SHA2568edcf9ce4fcc277a565b3714553c74b41e62ba5ea2a76817f32997de6f86a3dd
SHA51246e6497829d8b224b7d55beb654a6faa83f1d147e76d796731760b16b4d999c58e8765fd92fb998d5062b70750a0f6a91e0f7546eaf940a7195bcb68c2e10ba7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD535f4915c00b3259d9f93cd0d505feb2e
SHA199092305c6272fe7436f9862400937f20ebf4091
SHA256f66c43b73fc86d0cf6bad29b1cc68734d86d1cf8aa5d136604270acb0cef20ba
SHA512a56b99fd81e996b2c524f2c407692f3d525bf1a59ca0e977a1281144268f79a4fc87d5e0c4d68c5a1eaab23aa3bf472b90681eeb1d5f3e3541a72e8a095e7ff2