Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
8a4af554451ac249a2f3e63e1d38dcea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a4af554451ac249a2f3e63e1d38dcea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a4af554451ac249a2f3e63e1d38dcea_JaffaCakes118.html
-
Size
261KB
-
MD5
8a4af554451ac249a2f3e63e1d38dcea
-
SHA1
1750c60fa07985b1cfcf0be58cf21c381019b30b
-
SHA256
1d1f87ba0950a7b433d74b35f91c44d5c36157b911dc049917ae6b1a2e0bff8d
-
SHA512
f2235c30a61ea228e647d81e35e200fe6f6a9ef9dfbdfc9d55d61112353c5e9ad4558e7034c3ad4e8b50319f7ffbb893b78f452db2f68733e64cc784be98230d
-
SSDEEP
6144:SZBg6B6J0ZsMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3096 msedge.exe 3096 msedge.exe 4728 msedge.exe 4728 msedge.exe 5572 msedge.exe 5572 msedge.exe 5572 msedge.exe 5572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4728 wrote to memory of 4140 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4140 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4932 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3096 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3096 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 6100 4728 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a4af554451ac249a2f3e63e1d38dcea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa127d46f8,0x7ffa127d4708,0x7ffa127d47182⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1534173286821615193,17740976635682761601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,1534173286821615193,17740976635682761601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,1534173286821615193,17740976635682761601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1534173286821615193,17740976635682761601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1534173286821615193,17740976635682761601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1534173286821615193,17740976635682761601,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD50c57952bb5c20596137b85afa4495143
SHA1193744de26d4da6975398bc25e34bd654a77a8e3
SHA256aab512c73c153d51fcbd9ca1f89e9d2d54b7366487026e7a7903e73820a75019
SHA512eedc88dc556121fa4f7844aafc2173717804c7d0516f63707aa24e4df4a57516a8fabe3f29e792b697bfe11063aa36c90a9f635180e44ac9276bc349719ae4df
-
Filesize
6KB
MD528e2053ee110ef32f5f3fefa4c492a27
SHA198932cce51f97b0114630d0aadb93938f73abd02
SHA256cf180b4abf86d2ff32527d5296d8c11501e62610fa5c2d5b2d555763fdff0ba4
SHA512b95992e4fe1dfa99ff5a7a82aaaed651b99b6fa787d9d3fb3ea79b384b420dada085058e8f3fbad6810d1cde5c43c0ccf090b4d36d841de0fe204bc8b74652f0
-
Filesize
6KB
MD51584c70cfed6df65c79afd801a318e94
SHA1ccbd428fffa65d65834f064125dd812f2f2cc260
SHA2566b66fb986e80d9a03e0e8517804e826f02dea8988ed6f449fe0104da24469a78
SHA51234ec29b0d4d68a87536d48723f5d4cdba49674c5079f8ad9f3879e4735ad731e42d2c4132d96714c66b9789d791f7bd9773769b8dd4bbc5f450b56ea453aeec1
-
Filesize
11KB
MD5e5d952852fb4351906ed8275cfadc71f
SHA17849ef830fa7c550688a335d2c431bb662dd43d3
SHA25647e15b6fea7fbd046d963dcbc5fa2381913e36069403f46e6687f32cd6e55206
SHA512a0204ac29ab7c2c457afcbe8adf3731d13ff236516122f15d8cfbe17837c603e693786943a02d4b892e1200dc8c1476fc8097f729bf834605b4cebf5fb9832a8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e