Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
8a45036b0223ea9b61a9cca803cc86b2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a45036b0223ea9b61a9cca803cc86b2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8a45036b0223ea9b61a9cca803cc86b2_JaffaCakes118.html
-
Size
24KB
-
MD5
8a45036b0223ea9b61a9cca803cc86b2
-
SHA1
429b9ec873ee3b6ae2c5f2afa29fec9a029a8253
-
SHA256
29dfac69de841547444a4fae7f6523b21cf69f6fc79fa0ac04a138e55f0af1ce
-
SHA512
ad2b2eac4e910258e26f27fc2b9ecc01403b8ddb2e6cb13d1af8c335595ff0f935ebbaec1381aeb095195c41144cb2b4547da4bbc3f9471070f4e3c40cbae4e8
-
SSDEEP
192:WLZLwKQbUOtUdQ/uQe/W1Th/BlgV46B+lCxPi6blC4Uw5WafW8OhT9Z9LRuDW1TO:fzU2/Ie1TiGW3aZCy1TXoP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 2144 msedge.exe 2144 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3652 2144 msedge.exe 82 PID 2144 wrote to memory of 3652 2144 msedge.exe 82 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 2768 2144 msedge.exe 83 PID 2144 wrote to memory of 3052 2144 msedge.exe 84 PID 2144 wrote to memory of 3052 2144 msedge.exe 84 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85 PID 2144 wrote to memory of 2188 2144 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a45036b0223ea9b61a9cca803cc86b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9477622011480463938,11483733130499119469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9477622011480463938,11483733130499119469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9477622011480463938,11483733130499119469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9477622011480463938,11483733130499119469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9477622011480463938,11483733130499119469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9477622011480463938,11483733130499119469,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD588d1e79557bfe8b96c583cfd4c7cbdc8
SHA13715bbbed95dc4a2c06ddfe03592f8c2c94a77e6
SHA256887933a94b950d0f3a3b7e6f01e7c5974c477049c8f366575520c284e81f7b14
SHA51263a5c35a6b0d98ccd1f22070aaf0b6251798c7731f25bc9d28fac94d3be81265a85d9e36de8e7a794f98061c01cf590459480a5d8c8b2082edc31218560bc57b
-
Filesize
6KB
MD5c9b5c6c00ca0877980e679be9eedcc25
SHA17c237733fbe84f0b6acc5cb29f59dbb1a5e6c063
SHA25699764522e6056299e7a631f14d838850b00f95c7eaea169f14a0324d61349068
SHA512624c9c6e71a9fae5846ddab59018e4bccdea4a36e7cef4d0d14c2fa0ea44cf555df36dbb6ec080440d9815676ce314c6617aca0acc774842a2297e6510116cb5
-
Filesize
10KB
MD535227baad01e50e852d6ce0ade90d5d4
SHA19b8315bdfdaa650ad292f1c0a3053424158a0952
SHA256e0b8cd5ea40564151c3d6442e09567b2535439248ddd09af396d5d2ad00aed34
SHA512b3cac44b2d69c36bc9be3e524d510768e8573bdb707ee9ab7b27d6e49e755505d923f57b3d102e91286cccae09fe68a7c5c3c7fc567a0b950e401288eb9cab6b