Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
8b3fcf22c1ff62601848d88b5fb92def_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b3fcf22c1ff62601848d88b5fb92def_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b3fcf22c1ff62601848d88b5fb92def_JaffaCakes118.html
-
Size
71KB
-
MD5
8b3fcf22c1ff62601848d88b5fb92def
-
SHA1
2865466f143c2671ed40e55557a9688e2eb8951d
-
SHA256
ee843f59ea8abf51f266fb1c98dc4a2f5f3d495ad61dd8694fd27593235dab35
-
SHA512
67235fd5000f1537b9ff6c0d15890124176231cb504c03d49199427eb754d40c95400e3e2f5fedd9c6d5eaa18a853720c51bc9d4401b50037c8a11dd7e22b666
-
SSDEEP
768:JiYgcMiR3sI2PDDnX0g6sAC6idRfi+YrxoTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:JwUKvfi+YrGTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 3552 msedge.exe 3552 msedge.exe 2160 identity_helper.exe 2160 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 2028 3552 msedge.exe 82 PID 3552 wrote to memory of 2028 3552 msedge.exe 82 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2864 3552 msedge.exe 83 PID 3552 wrote to memory of 2428 3552 msedge.exe 84 PID 3552 wrote to memory of 2428 3552 msedge.exe 84 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85 PID 3552 wrote to memory of 2720 3552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b3fcf22c1ff62601848d88b5fb92def_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,13399611308511227327,9314884225589604500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD5671022518441e520e5abd8a01d22fe36
SHA15556be7547c84f2c82b3323499fcfa4e56c84a78
SHA256637d2a8530d0af4f86e927717079702eef5a32cb1e3024801bb13470c1ed1c47
SHA512461a0a72472ba7c1c1d5def7777c6365a259aa9a4e016b9fc316ab5178c42c88bb8f6f030ef222a15a9df807e710926d33ec444cbc7abfb5b56a2be2cd2317a6
-
Filesize
6KB
MD58075ffa279fa2c808099aa4645fbf85f
SHA16042b293284122f23a66d7adf7961f9fd9fcdf66
SHA2569546cb442f55da4b8ac32fa03c5b5ff223f96b3cfa5d2f29965e1e5ac7dad189
SHA51246eb6c2dd07314c1e28eba8dc7948bf4cd8d45727b3808a79801c5262cb3ae49f1cb98925fc7ac7e708934195f4f6dec82b791e6b9b3ebe77f2aa4611a3c5f57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59652c089e84a1bfb997c625734a9560f
SHA16f84672ba2d569511e6ec050273301451cd23979
SHA256a326e81fc88bafd5f9c011a2ca2e8d6e391db9ae7e2767c0836cfa854dbad9e9
SHA5120044230f76310b9a70b9ffb48d559107b086fc8a5fa3cc31236a35efa127882df0fb207e1a12ebec4a3ea17e2e1ac38929f2224e77eaffb257df1162b5fc8788