Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
8a2c473d8ce0974ec1619515a4525ad7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8a2c473d8ce0974ec1619515a4525ad7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a2c473d8ce0974ec1619515a4525ad7_JaffaCakes118.html
-
Size
140KB
-
MD5
8a2c473d8ce0974ec1619515a4525ad7
-
SHA1
a8a87b1bcaa68dd7a92e379fe0b9c43ee034b883
-
SHA256
a730b8d4c9cefc807ad72b02bcc432b656ea8f7db0babe14098d76a7dec7359d
-
SHA512
ef5836600f8950ec0a8ab0ae6d8f21ae536fb37b11337d45f421760095c06cc9b99af24516f5c10781c8937996ab7843d5edfa1d312881e17e519f11c64688ed
-
SSDEEP
1536:z1ZydlEbbA99YZHqRHHEExx66++IIddtt77bbSSSSccllbbFFDD998811qquuHHa:zCdlEbbA99YvV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 928 msedge.exe 928 msedge.exe 3872 identity_helper.exe 3872 identity_helper.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 1616 928 msedge.exe 83 PID 928 wrote to memory of 1616 928 msedge.exe 83 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 1012 928 msedge.exe 84 PID 928 wrote to memory of 3372 928 msedge.exe 85 PID 928 wrote to memory of 3372 928 msedge.exe 85 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86 PID 928 wrote to memory of 4316 928 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a2c473d8ce0974ec1619515a4525ad7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1436 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10297347442918420265,2852049032803886755,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\87eb8a9d-1ef6-47f2-96f4-933cce8ef2f0.tmp
Filesize6KB
MD5f0daa71ab934ed0c2f857f766fe37da6
SHA1f3c70bc3dc4d6de3ff4c94e41e70baa9b27ee62f
SHA2563b0a4f609fc75f24f9d21e152ecab4ba7f8182fbae7fc183bca12dbc9811ca96
SHA512c0eb93f11bb8be1172589391ec61a2f6b826d2ab49549406e42a40b4174041f447a0bfef2906ece90c52f6d5f5a7a183777b454755130b776abcbeba90259eb2
-
Filesize
5KB
MD571b2975706e3ebb3f563108706c97f41
SHA1fcbcc69df53f4519792a17f16c265afc3215fbd4
SHA256552f81eed641d38bc077eff20834f877829b3bc426c38c29a7e83f1cafb66298
SHA512edfeb62bc9d0f7d0538c26c5f795bdd6990259b08392735d83957d6be9c7f2129b8e632a0c796b59fd073f4730becf788a1b719647bc94e48340bfd70616a342
-
Filesize
6KB
MD5d56f367c52f7d04f9c5c760b2a72a495
SHA11814b7ff60c088285b9ecd6061504d904e6ea23c
SHA2562f4acee9436845c16791d32170ea9a1a9e3ff3c837ca03e655834364f7c5d476
SHA512aa6d20bd12e49c7976d47c09eeda75f1334e38832abda5806c18b4db570031f74e5ce08a03e07c40bb3bf7fac16f72fb58789af5363dbd66ceec93cec74f047b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e5d6c066110513dd921a9a8024cac9b
SHA1e40ab8525fdb4cc6f107f0244356203e334a00cb
SHA256323e448804d1459ac0e5326160d3343a34bcdcd9135ea5b7ba7db4749b89f3fb
SHA5128b1027a17b7c00092ca98402673debfbc831b76089a6b1f8223b8962960958a3e0f7cfda0edf8ae318bab1b3a0d97bcaa9e106cf54378fa5d3a6bd31ae9e64fe