Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
8b0011c2fb6563472c0ea0a6393f74aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b0011c2fb6563472c0ea0a6393f74aa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b0011c2fb6563472c0ea0a6393f74aa_JaffaCakes118.html
-
Size
50KB
-
MD5
8b0011c2fb6563472c0ea0a6393f74aa
-
SHA1
5a5e20483c9c205de4e5b62c5c4400fc03955196
-
SHA256
ce3e9839a4f51f0888a722855e6ca343d6bd8ed1c72d11b34d8bb23619f67f6f
-
SHA512
4cbc2fd5216b16999f2559458c3e1c45c4d05cae36f58e5daf6bee9f46ed47235e468f74142ed3affd2dae0dcb7dc7730404ba08e0a60d5e0065d965deadac3b
-
SSDEEP
1536:vFW0lH97p9rCX7CesEMsBAc0H6LrI+mJFYJy0Zdi7:vFW0lH9V9rCX7CeisBAc0aLyiU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 2320 msedge.exe 2320 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2216 2320 msedge.exe 84 PID 2320 wrote to memory of 2216 2320 msedge.exe 84 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 3284 2320 msedge.exe 85 PID 2320 wrote to memory of 4552 2320 msedge.exe 86 PID 2320 wrote to memory of 4552 2320 msedge.exe 86 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87 PID 2320 wrote to memory of 1644 2320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b0011c2fb6563472c0ea0a6393f74aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2592 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18062633341260253385,9721002402313531796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD558df49aedeb27946597db515e48a7b1e
SHA175866081347a72745b4128a2442a9619c8e6a5d4
SHA2561ab545d8210891cdabee8c65ecebef15a5dc991e6f7c851dcfd9bd5b72a49b8e
SHA512692201b0cfc8fdf58233e3dbb63543bdf0423a813720878d162d9b4831b71fb154745d130a0f6a50425778bbc4453a11255a90c79f595f4c40e3e3819ce60b74
-
Filesize
6KB
MD5c0ba7126f84f8468af752b645b0e87c1
SHA1a7fb0430fadcae582dd5bfb26cdef26c9a7fe0f8
SHA256eb063fe2bcacacac28a54b313a48923879bcd9449c8dabfe9b930d4750578b2f
SHA512575e2891beade560f81991bf6479d1818a1ef0a8b5af53d942f4a5725b7c0780e6a8371ef134ae5dabd4862c199d98d4b1d7fb116c1d7f86b4084948a44235f7
-
Filesize
372B
MD5daed8d76841864586c3ead092b3d04e0
SHA190f8a0f0a98ac931468eb337baf3b2799c0ac3d3
SHA256a411bb2c4f93a4f86cd2fc60474a154c0df47f55fd4f3cec01ac1588a8c90de2
SHA512eee4b1a96964e3edff4b329ff40a7e4d9f7195b962a63af675c9a1f7404498dff70c4efd911b82fec6896e5a9e414ffdd37cf85284cd7d5f3762585d10bcbd4f
-
Filesize
372B
MD525da268877d50d9507541e5011030f1c
SHA106c9ec478b62be6f273f4d3ddf6edf467c225300
SHA256274ecb28c39c7bfd8ea1e7aa512414f12e6addfb951f44057694a4b7d6ddc6f3
SHA512a8325304d53567a2bab7d80487d1c807b30e8b82db3e313d8c8d3db74f54c66bb1c8a30e4812536772db42f25b11f899fbc582e8ce6779bd67ee6225dffa0fa3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53766229660f376e0641093975033ee80
SHA12fff91ccca37c97749aba252e6d25484d0168450
SHA2562cd95d3e890b69548bd21441b5fe8d4f5823bd9c54fcf62ee5ebffa7a8237d16
SHA5129162036e0adbfc9c5a7412d92209bd239d55e0c9925c54c1baac8fab27a230e1aa8a51d37f0abd9a1d1b0e2bb9a60e2a803f54337cb7810a48a42473c8ad08ed