Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
8a6ddf0d4215d9ee4ac7f8c03d7de3a5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a6ddf0d4215d9ee4ac7f8c03d7de3a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a6ddf0d4215d9ee4ac7f8c03d7de3a5_JaffaCakes118.html
-
Size
19KB
-
MD5
8a6ddf0d4215d9ee4ac7f8c03d7de3a5
-
SHA1
7fea08836af93c5de3737ee657ad137e1dba3034
-
SHA256
18e1f0790fb65093f4970d98dba33954599502ba5c5a5c6d42138a109552826e
-
SHA512
e72630f055712cbfe37818a41a30ea2b5e46f3ff47376908cee8d074b945193b053c241af20d3c2b5e8060cdcdc5126384c0a8c5d40e5983b05292b23dd2b7bd
-
SSDEEP
192:uwzxb5n1tnQjxn5Q/0nQievNn3nQOkEnt0+nQTbnVnQmSgHMBPqnYnQ5mNnlnQVc:YQ/Mq6Nu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 1672 msedge.exe 1672 msedge.exe 3096 identity_helper.exe 3096 identity_helper.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4564 1672 msedge.exe 83 PID 1672 wrote to memory of 4564 1672 msedge.exe 83 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 5008 1672 msedge.exe 84 PID 1672 wrote to memory of 2844 1672 msedge.exe 85 PID 1672 wrote to memory of 2844 1672 msedge.exe 85 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86 PID 1672 wrote to memory of 4780 1672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a6ddf0d4215d9ee4ac7f8c03d7de3a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a48546f8,0x7ff8a4854708,0x7ff8a48547182⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7683547078378955811,4941886644368245844,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5494429f3279ceeaa4a09e026f32748b4
SHA111cf43664c94e41dd4090e69b8d75590234f468b
SHA256f152352dded0f45002a3aa3cc7c33558e97e8c0df63baed1522607d33184ddb3
SHA512dec37fec2074d43ef4816579bb61a258da2cb2a26133d1947281d564188e7b42e49b950c738d98fa8fed34d55075f6739fd6f62eea48d04196a30327cf7af0ff
-
Filesize
6KB
MD5af992ffc06e041d4996f321a133fc1e6
SHA1afab6e147cad61af576b30b8cdb16a17a1a98f6c
SHA256f138f7c79cd7acf5c5cce1120569aef57ec6d162dd15a5c4c6aa286505683b8e
SHA51222c294dbd6f3631db142278c76b503959a202025da8c3484dd62e1a89b6438174db7f190c0e9cb3323f26e0637726ae80241e9c28a9cf1d6659d3850417b4aa8
-
Filesize
6KB
MD51b91de12b66f054e5970dcb3b8565769
SHA14ee924689bef0fcb15b5a117f92f779c89627d17
SHA2569a923d74e80b6b1cd37ca2b9e7826a072ad4f7b2446a444b622f826be5c3e592
SHA512ad8cbee2185590152418234a8f0ec760134e1a8231b2e10a6ff8944f3b77e8a4a5b2777e06b0a3aac6672c30627da8f59ca89c55d465ac1bde6e27d4627eb57b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD568b763fe043ec1fc0b368f7f6c70662e
SHA140ac3e2357256c84e5cfb7d17778b2d32351e48d
SHA25619c9827311fa863ef8b4692cfc5509a234cf49a6ea1be5b06717e059eb286e6a
SHA512a952a549ce8acf6bceea2fa844ae3caed551a7c1da275d7807d896e718cf7776abe0de4413695ec2b698069bff300125a0677a912cd65b78702b20bf19f992a5