Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
8a457968a7acd5dcfcd034f9ee84fbdc_JaffaCakes118.html
Resource
win7-20240508-en
General
-
Target
8a457968a7acd5dcfcd034f9ee84fbdc_JaffaCakes118.html
-
Size
32KB
-
MD5
8a457968a7acd5dcfcd034f9ee84fbdc
-
SHA1
3da7ed708d27e50a9a1f1590202d7b676277e40d
-
SHA256
24d3f8464a99b7e255370fc69f889ec476cf9c9b75dd18bb30406f11cf9c817e
-
SHA512
a65e1b70924b66e9af7d64050184c2ccf9c4548dd7a6b274bd833cadfc50b33992373c65233b495065e32172f3bc4ba416b8aed422d7dfb81faeb62504508f77
-
SSDEEP
384:Yi0uYMMSwlKHSSoZ7eGp0lTF/+8jua7xiAWH6CKyCBOQJMW2ayISyIrgj0:jd1q7N0lhn5Jugj0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 4672 msedge.exe 4672 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 664 4672 msedge.exe 81 PID 4672 wrote to memory of 664 4672 msedge.exe 81 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 1452 4672 msedge.exe 82 PID 4672 wrote to memory of 3876 4672 msedge.exe 83 PID 4672 wrote to memory of 3876 4672 msedge.exe 83 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84 PID 4672 wrote to memory of 400 4672 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a457968a7acd5dcfcd034f9ee84fbdc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c8546f8,0x7ff80c854708,0x7ff80c8547182⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2537614148905405133,1714539839434387383,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
1024KB
MD57888c6276cc924fe3fcb577dfd5bf14e
SHA188b6a5d3de5857994cebfa494010706d5bc79e9c
SHA2566b48449adbf6a455baa3f7eecf792ef6775c1450c4d48ed8efa9d9066bfb5afb
SHA512b2b9db9ed33af2a335eeab3e108f95ca272a2c0edb0d19bc8219bfae825efa733283ba8ca34c40ebcf250b426272ce43f541d3c1699e945565a82df9d97570df
-
Filesize
189B
MD5efd079652ad21c50d69ad30ccf61a40d
SHA1000bc74057bb6ab42d2a160349e1597edb211bc2
SHA256045646bc1a87f1ce57c87ba8a6ed5332e36f71e667ac712be1df2fef80385f8f
SHA51235f643af8bb12bb445e3e6ce7577376dc69010ddf8d7e76752d703cb50f091bdeb9947b9718baa6e9e286d69df19a794522e446f29d58dc26dfea571045f51ab
-
Filesize
5KB
MD5a8447f0ca3613903599429d1123140d5
SHA1da85a1a4ed19d4ff994dd21615ca08c2bac80f25
SHA2563d2596014b9d2957c599490833824533591b36c422df91c5ca69209e0795e778
SHA512afdbc1a274ea4b088557042381ce14714d433422fea8a428af1c40e342b73c60eff0f156c19e7a2b7aab9c75a64ee191bf798e1a458c2d4fbee6893a838f6bce
-
Filesize
6KB
MD52588248a82af2e2cccdbd5c1a9b7dab2
SHA1e2d011842176621e807c8288dc31e06b2fbae953
SHA256af214ec46237e616fe8c5445b82abac13919cc6301feb95e78538ac92667cb33
SHA5129a10f59310323b2c295ada78239054d26b63f21ac6662873b0c0f474ef9cfbf1ddc731bebd6bd2ff9f514e6e18479beeb9844eb602f28f0b4431f979c86b8602
-
Filesize
6KB
MD55198c801ce396b4eb30f963f7249ac4e
SHA1dd2378d8d90f57235fc8c380e12893924ba13dd0
SHA256d1166748dc8e9a3cf3ada80140d8f27391d9835c6381dc1f8e42599ae23984e3
SHA51206ba1b41b5f2d0d560089f213966192ac5691a43209ffb89c1f38c241d4cb059763dba4aa06556ab2a3e15f6de4eee186bdcd75ec8620f0dab95ab92f6fb0b1e
-
Filesize
199B
MD510efe8f6fef825b0574a566c8a683fbb
SHA1f4618851ecfc98e95be1eb2cb7f7c6509e59182e
SHA256fa7f23e504ab71c67f397701d6077326d267371d9e8d8c1be0e8e3cb139c91cf
SHA512c3b46344f5f11756268ac4efc8babfec9269673aa77aa9b5e93f65e10a52e4cc3aec2fcadcc23476e65a1ff05dac636713aa5ee0f717adde2f905ba2bdf9fd2f
-
Filesize
199B
MD5a27f7c24f9c54c1ec74269dd2c512eb5
SHA1f5ecb90da8b52d49a5197c4ff8f37b958ff8d27d
SHA256f45cc4364419f16fceb6cae874109828d924c7c9dd5fb9914d167c8a1a13bef8
SHA51277d65d0d0449aa2ba3cf5cf9f2c44a51f0269e40574bba10f7ef9b0f7b273b8bf1971e8eb846215097af090e0d309910b7a103133e0ad637f0f8c9c6e6a72950
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ba9a21d21f244974dd4a299c54b6a924
SHA195430c93bc9ec7dba28efbb5ff514acf23178e03
SHA256ad1d18d7fe2b1ef025be83947eda6fc308df612b59f481f94f7a4622c5ebd6f4
SHA51232f41bd56ddb02978e6b2e961789714676f16b298dccc928f84192fdb030e78b88bb31c3b426b3c7e790db6714aba2e5169c17055668436daf6a17aadb549c3a