Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
8a23a0af364992a8563be3891353dc7a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8a23a0af364992a8563be3891353dc7a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8a23a0af364992a8563be3891353dc7a_JaffaCakes118.html
-
Size
28KB
-
MD5
8a23a0af364992a8563be3891353dc7a
-
SHA1
c2c174aebfaa8166ff1051b2e9302f839cd50e70
-
SHA256
bb8def468c5ebc1462eb0bc2705822076d0837e2b7453f5d29b59e49125e287c
-
SHA512
267bbd12ce03bdeaccc0691f188e504d0f51daf080f002ce38c768d8131eaf3d7924d0696138f681614d1912026a03b1d1f6fb188fe3ccebee347034d88208cd
-
SSDEEP
768:SkzdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQGchS+xz2:SidsFqvfug1C5m1CCCcmzm3C/CnCQ5z2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 3988 msedge.exe 3988 msedge.exe 4744 identity_helper.exe 4744 identity_helper.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4120 3988 msedge.exe 82 PID 3988 wrote to memory of 4120 3988 msedge.exe 82 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 1448 3988 msedge.exe 83 PID 3988 wrote to memory of 2420 3988 msedge.exe 84 PID 3988 wrote to memory of 2420 3988 msedge.exe 84 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85 PID 3988 wrote to memory of 3048 3988 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a23a0af364992a8563be3891353dc7a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe4,0x100,0x104,0xd8,0x108,0x7ffb19b146f8,0x7ffb19b14708,0x7ffb19b147182⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2016621022502161788,9590971489709599577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
943B
MD5a1225087de452d57b2361708cd1b4b18
SHA1a064b2686b781d817a0bff90a416178cc0d341f9
SHA2569fe25d6d3d755e9ef0707e289cc502ee430385a916b56e9ef5ec778eaa8276f6
SHA5124443ae106fbaecced57fa542edaf4c93d608ec4064daff22c6f9ddc593f872a44df45e2384d283c2d7c6711893a2cd40245364d831215b787cbf07033bd2053d
-
Filesize
5KB
MD5c70da88054b5178315a4b7c668e6a5cc
SHA1fd893d84c6622c4722ee2089b707bed5bca389d3
SHA256d6571dc2e89e2cea265b5259ef91c37f4a09b6dfdf4ef630322400592fd6d897
SHA5123b24c69f2d59333cf64674a63758ba1b86561a81f3de90e570041b789f3aad65394cafebd9c0c70e969584eed6c73cc56040c1e39ea790bb21d49c8e51527ef3
-
Filesize
6KB
MD51b2fcd866c9fa2588596f9f9ff27ab5f
SHA1131a399cb776ac8f1e579e2154f49b20528ac001
SHA256e862d091a54409d87c2f1194dea1b98b95bcdb04ce0445c508a3b5628ff096c3
SHA5123c14ee54dd00b45680de81c31046fa234b4949d5b89b86b2fbbd5fa3e35199c7d7c9e51d8e290a07b03fdaf07d1cc8fae9b8ab17b234deeb6f8a1a0a26aa90dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5032c87cce9fbfec29dc6e05c03fd8c21
SHA1747a8df4d483bbabaeb83eafecf167c1d1b91be6
SHA256b4142113fd2448771431b6898f1317e724926209920b0a7e864a223d10ff4798
SHA5128004e0ec7429200ab7f7d6746a560327911a1d452c8f24403fe6a2f08bd40a26a20e8073c9a9929ded31205b0920861ed8896a28b5e422c44d7edd71d430be83