Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
8b1d2bc1a62ddea384dab524f3e08294_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b1d2bc1a62ddea384dab524f3e08294_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b1d2bc1a62ddea384dab524f3e08294_JaffaCakes118.html
-
Size
36KB
-
MD5
8b1d2bc1a62ddea384dab524f3e08294
-
SHA1
7b5f7809c9ce4c1c74fe3df6b84d32f6c984cc4d
-
SHA256
e4cc5468f2149620f2dca47ed48c72123da089d36780a7fe2e416285c54c93a2
-
SHA512
070ee44328ab3ef767a0a2cdbb55c6dfbde2b724e2bd64dc58176292598d57a6eeb173e8426f5dee821d4c4ff44bc28f01f8aa8cdaedbcfe939399673a6773b6
-
SSDEEP
384:ei/dXpplRwyFwEcLOixoVYTy/vwli72cPIX2yxalQ4Zh2r2o2j2J/wIq687:hXppPwyFw3LZKVYTy/vwJBazaG687
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 3284 msedge.exe 3284 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3284 wrote to memory of 4504 3284 msedge.exe 82 PID 3284 wrote to memory of 4504 3284 msedge.exe 82 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4768 3284 msedge.exe 83 PID 3284 wrote to memory of 4168 3284 msedge.exe 84 PID 3284 wrote to memory of 4168 3284 msedge.exe 84 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85 PID 3284 wrote to memory of 4296 3284 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b1d2bc1a62ddea384dab524f3e08294_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e53746f8,0x7ff9e5374708,0x7ff9e53747182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10814050495188029857,12308573654786485199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
388B
MD5aa822469bd627ca5e11435a29f9ad7ab
SHA1e1d1fd8eab34eddd936d8aff9c8632c2a4ac81b6
SHA2564451b95479156aba6d4e22db74cd5e4ed32a581770d1f4fe15f0e2de9f772d8d
SHA512913b5bd1d98bf9a5d7d45c3208b89ce9ea37208bf6932d7f640e623773ad56eff568e8f4d6ecc46daf9feb994ce709bd8a8b1da220c0bcf5fa3e4a46e9ecd230
-
Filesize
5KB
MD5fb5464ba26219f458c55445173151297
SHA17311a458514b7c18724b9e3eb5722bc1d6684c60
SHA256040e306bfdac06827dd285e6b3ca36bd1ba62fd87cd0bbf27ef94bf59cdfc263
SHA512a5fb93f43a2e4c47011a0cb80ef610f8b06fcb4b693a6445a77d7e967320d40c53c50bff9e28bfb1f88626877c3106e1a44c520c17b3d41d4006b41ca9c0e27c
-
Filesize
6KB
MD505b25b39c7e1e41be001f4ba5fc08466
SHA1589eb6ad0a975e69e28e8de13ef68d2fb1345bb9
SHA25613db1f76d0c304414f8e5f14fa99c98ebdfe45e7c4c84682b108794d27109ad1
SHA512010641fb536f6f91339c230f452458b6fed7cd63b319a749d2af570907bbcc7b10643b03333fd58d141b8df1adb7d2443687c5d28a0d42326f1f9f9c54d72139
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5473117c3cf4c19b8f8fbac26ac555ede
SHA17578716f0447b7317388ffa1ae9492b70e991d21
SHA256731245498e5441114e8a76f6bd7ccedf0dfcd591eec6d6c830ed1c76c5e60260
SHA512a6d41a0586c97cb1d16cda68affcdd9d1584695242a956a4ac1415ff6cff4cfe16526fefa2411dd3f877bb9b7c200d9840caab88ac1e3b5bc39237d807c42b85