Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
8b2f4d46c4fc743981af847d3f8b8009_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b2f4d46c4fc743981af847d3f8b8009_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b2f4d46c4fc743981af847d3f8b8009_JaffaCakes118.html
-
Size
51KB
-
MD5
8b2f4d46c4fc743981af847d3f8b8009
-
SHA1
e79b0084ca03d404ac69582ba1d787fac3f29609
-
SHA256
a819ad6fc1bf3a782c0e9cae7427caf752e10af4c43af8a366aca234c08ebb49
-
SHA512
5d0c92946e586f6877d57759218ee29772fe489521e4eb496f7707be5a1a49516805f6f8ba38fb8b75af441f269df9420693ea0c4488630c60e3af249420935b
-
SSDEEP
384:ypm75Dnhm7TGxQDi5ZRLZDQR/xe8YMjaM5j6wGiNf75Rn1zXFXp6evqaPi0nX7HA:H5DncRNBd1OefiHDhZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 2644 msedge.exe 2644 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2192 2644 msedge.exe 85 PID 2644 wrote to memory of 2192 2644 msedge.exe 85 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 1420 2644 msedge.exe 86 PID 2644 wrote to memory of 3552 2644 msedge.exe 87 PID 2644 wrote to memory of 3552 2644 msedge.exe 87 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88 PID 2644 wrote to memory of 2076 2644 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b2f4d46c4fc743981af847d3f8b8009_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2993782777747226515,9640937450727955733,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,2993782777747226515,9640937450727955733,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,2993782777747226515,9640937450727955733,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2993782777747226515,9640937450727955733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2993782777747226515,9640937450727955733,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2993782777747226515,9640937450727955733,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5bb908c72857526179f6ceadafd3969ac
SHA1cf3b029a35ce517ad4e0b547cfde2bffee5fbbb1
SHA256f533f17041951ac67c122789ddb5b39d7eebb6c7e60aca8910a5d7bcc869c8bc
SHA512b7e70f8b25476e2531834baac482715298d914919c1512992b48cca280af314683576a38dcc0b3b3e581296e22e603dac654409cbb19640c9959a779ef78ee5c
-
Filesize
5KB
MD5522e4e07b454a185ad32cea9c07432e2
SHA125c036b84241651b6dc11d7da21f3d0ffeb2632b
SHA2567d32da9188b662fd1b67b584c18a65620b75fb84ed6e35c16af8081f063e52d2
SHA512cd054afa1d58bcb34a3080b480ddbd5d9bc627921292404f46af4598d23011d4992f4e2268f37aa1ad923aec01b7eba8c0f4544ec60e3c1fb3ff70c06a77ca0a
-
Filesize
11KB
MD5c84dea55cbb8c73cac9cded44c22ed67
SHA1471c334d8092476a64746dcad1ba6d4be4ccdaf0
SHA256c67b2c6e2f1feb86b1112f1b4cb77728c941d0d7aa3303c6f0fef6657cc8a28e
SHA51234d3271c6752e63fcdca4d6fa212546071a241bfb9ef8404a3c1c4812f6cbaf37098ecf8ef05375a2beabc1a14eb442b50efe9c1e6e0a5253cc779fd51763c5c