Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
8b43480f08927f55ec4e50151e49d2fa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b43480f08927f55ec4e50151e49d2fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b43480f08927f55ec4e50151e49d2fa_JaffaCakes118.html
-
Size
94KB
-
MD5
8b43480f08927f55ec4e50151e49d2fa
-
SHA1
d655d2f127beb784a20572346275d93e0ec09d71
-
SHA256
8ed5f12343f8a043865b92b61455799d20dc1c99f964e82bdc066e3e0fa3c23b
-
SHA512
cc5d1946fd48779e44e5ff3bdba964ca634726cfdad72a184603b58f7bfd7d1089e159124584f35c66d2f9987da066742ad0c61134067ecf03f88522e4338c4d
-
SSDEEP
1536:WMLiNk/vYhpBSnzU7LnFS1FLlRfBvaf9vZeyTg3BdkrY8mgHC+qpEyW:WAiwcEBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 1052 msedge.exe 1052 msedge.exe 5172 identity_helper.exe 5172 identity_helper.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4040 1052 msedge.exe 83 PID 1052 wrote to memory of 4040 1052 msedge.exe 83 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2712 1052 msedge.exe 84 PID 1052 wrote to memory of 2656 1052 msedge.exe 85 PID 1052 wrote to memory of 2656 1052 msedge.exe 85 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86 PID 1052 wrote to memory of 4092 1052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b43480f08927f55ec4e50151e49d2fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff427246f8,0x7fff42724708,0x7fff427247182⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,4653486294231250362,18274766707762958261,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0553b8cf-d81d-4017-a745-87b668832aee.tmp
Filesize6KB
MD599079aff17aba0a5e3e5740c9e088852
SHA1558858ff1c10737c756240099c053ac22a0ded77
SHA2569bd0a2db7baafeba6f9cf1034d73a9f7c09dddf32718fc9bdd4cedcd05a9e1bf
SHA512563cefa4731bc58222c52149316f8b723f661339787e6ec76a9c56af60a11de924a24fc95b81840df7c521a68ac5948b07ddcae91fc13e1804565a51cc524972
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
5KB
MD596347a072b7b3bfbedda8fd12b4c3245
SHA1c3db7a1129e2c96bb224ede4486d5a88bfa847f6
SHA256193990d071f079a4126bb913226b984eabfffcc30f0f22c60e4eebbf3d3f7a9a
SHA512c24b3aecd4d5f35de665887db4846cd5ea45f3d84d93605b6349de91c2e9aca5b5523366034ee3f7b676ab6d990925ee8a82736845b53e0edd1afdc5030086ea
-
Filesize
6KB
MD5b573ac2bcb09c341a1be7203ea4e518b
SHA11a1c6bb3d71d57b07ce4b3277a6235c9eed0733c
SHA256355611236aa411740ee2a1c40f7f47a407e0150e542bd41451d76a8eef2f8434
SHA512de17d215bbbcd1cf6c86d2c8bf829343d466f298eb1239beb2ff212e5a75c4312c893c3300f3377727ee28bc2706d29a9c141706134b483f6f32116acc4de896
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59d1368f69b4bdc419d142ee6ff66181c
SHA163ac4cd57ae13d195440592e55038cb64d8ba3e9
SHA256badeb2978405133a251e69690518402d5ea98bf48c5a4c70de76e8c872246987
SHA512cad93738c9ac5ab15503c3dd145f595ca126025c52c0e4a5dbf735ee9c791d439393515980d9a84ded7763fd002649cb8f7c8742fdf6749c4956d7a739e88895