Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
8a7b695059bc43346b1f05b5ee35e88d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a7b695059bc43346b1f05b5ee35e88d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a7b695059bc43346b1f05b5ee35e88d_JaffaCakes118.html
-
Size
19KB
-
MD5
8a7b695059bc43346b1f05b5ee35e88d
-
SHA1
9df7a682cda3d0f69eb8403728d3776fb7799ba9
-
SHA256
4df1ac5433c1e8fd764524b821c67488fde691b0315fcd7ffe58779a988e28b1
-
SHA512
46b80d53b1134437bb1a8b3ffa1a51510211c0e1146e260cf973a43d94d27634f3821da7773e559c0a6fdf1ccd1f698e0ad3d0088d28f2c66e4e1cf8dda9ba11
-
SSDEEP
384:IJ63nFIIqGG7wA+wtBT/Qw3JrJonnEzw13ut3/D10wsLdgLmPhLxhaQ7hih8hMy9:IQVIIqGZMJMEZS5MSkpLUp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3292 msedge.exe 3292 msedge.exe 5052 msedge.exe 5052 msedge.exe 3308 identity_helper.exe 3308 identity_helper.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 228 5052 msedge.exe 82 PID 5052 wrote to memory of 228 5052 msedge.exe 82 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 2864 5052 msedge.exe 83 PID 5052 wrote to memory of 3292 5052 msedge.exe 84 PID 5052 wrote to memory of 3292 5052 msedge.exe 84 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85 PID 5052 wrote to memory of 3036 5052 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a7b695059bc43346b1f05b5ee35e88d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8da46f8,0x7ff8f8da4708,0x7ff8f8da47182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9316785278646529903,15726736513893501882,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a2a0b26f5b6f41e60a0d6bb48b13d193
SHA151cab75e0bddf9b24a8fb83c56607c761ad73e2d
SHA25617caab8f2e6fc7000129076bc90e690b30c2a239da486a84f30230bbfc813a1a
SHA512939de396661e3c340d0f3409d29a6ca5a4ee301d0ad712b80682575be3babcb3fb6171fe19ff9894333d947f63353bac031d6c8a2026ed72bc71285939e14c56
-
Filesize
1KB
MD517e77e91d8c0db33511befa9f3bdb28b
SHA1867d8298b6f0ea13688b20578cbe2178ef5b1fb9
SHA25648825a828fcee6364df8debd489d9f8aaf420b9a5c489e50680a5ce48ddee0ec
SHA51264d1579f406586909e1afd1645f13d30c2a16659346df8be454338150d60e7b646b97f88d10c9a83a343096ab30911f164b198d08cc44317964c56656135db48
-
Filesize
5KB
MD52384c3d57b926e156c0cec52394fa45d
SHA14a25af4aab7ff5213f2301b4b02f6341253aaac1
SHA256768632707fd2c262d4c3174ba576ecfc350072281865dd224b4a1655cc2cb711
SHA512e20b02990e1741c1f21bfeb78d2c035a9af105ecb756115506fed43def323dc54e6ebf490eb39dd77c9d7a1016c2d9bb23903fbe3119124eeb9338fd64dc97a7
-
Filesize
6KB
MD5a2515ea8e895084b01ad71d93fbf01c4
SHA10ddf63e2b7df61c803e320adc254a1c0706635a0
SHA256f33ec87b44620b822d0b66ac527385740fca0d9caf267991d0c8d091e326f108
SHA5127f2d77bf11b9f9ebad99885742d9e34e575727e5328eb29de021b5622f5787881dcd15c9fb4343d25f30f43f59a9390f054608959a21568617698f61e2725567
-
Filesize
6KB
MD515ea91428975cfff5b268386f2bdf903
SHA1ce370b3a3170eba4c1c71afca9ede235d8551a9a
SHA256b66fe60c54bba91f1f8c970b222732d7601a7f853691cb927d7031fa0b88cbc0
SHA512938b435ca3efa972fd2da98321830b58986f93e0b07105d95804b141576e65cc3341190f53653019894466cb622bed07490908230f7917d331cff6de7611b982
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ed0cfd70d5925a47748bc15e4782a94b
SHA16334e3ce218c6c04826f2c2ab5feacd42b6a7bf7
SHA25694a7f25c4bebe4bffa2b7faeb299c06b78825168b21df7a42beafde60aa5fd83
SHA51258dc8bb7e5fe9d91606ef3adf87dc7076e219ca4cac7c6b9728c45cf8f483bf5a70168ba697de0ff55cfb0a5d04a9fbf0764291179af6787ce0df81141950b90