Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
8b4ee0387b2ae9dbc6f55237a4af7064_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b4ee0387b2ae9dbc6f55237a4af7064_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b4ee0387b2ae9dbc6f55237a4af7064_JaffaCakes118.html
-
Size
142KB
-
MD5
8b4ee0387b2ae9dbc6f55237a4af7064
-
SHA1
975cb83221d7efb57b270893c6a5fa58beb6e42d
-
SHA256
eda5719f8135eb8b6a41cb58866c5688e0ae805df40129cba03194456c8f656a
-
SHA512
82c831591002851830545e8ce52378103987274a3f06b9f1997dd761dac4b1fa0bc5be297ad5d5072586b71bc20a31d3d69f1452b174d42923332b48f5b972a6
-
SSDEEP
1536:SlZpWA5D2Prx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SL5Cjx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 1248 msedge.exe 1248 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2724 1248 msedge.exe 82 PID 1248 wrote to memory of 2724 1248 msedge.exe 82 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 3544 1248 msedge.exe 83 PID 1248 wrote to memory of 4076 1248 msedge.exe 84 PID 1248 wrote to memory of 4076 1248 msedge.exe 84 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85 PID 1248 wrote to memory of 5036 1248 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b4ee0387b2ae9dbc6f55237a4af7064_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe4ac46f8,0x7fffe4ac4708,0x7fffe4ac47182⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,12626633444016014148,17909900701726650756,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,12626633444016014148,17909900701726650756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,12626633444016014148,17909900701726650756,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,12626633444016014148,17909900701726650756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,12626633444016014148,17909900701726650756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,12626633444016014148,17909900701726650756,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2500 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5a923e8bdb9837eaa879b31c40d26efed
SHA1b8208cc8bd56f07b9d6e3bdee7fefc673b238c5e
SHA25699b5b0ec5435f43f928a6326d17474fb37ab834c56afbfef0dd2de820616f809
SHA512bfaddcd4fcedf1e9d9dcd4d5a912b93842143e8e3219be1da399a980d3f0a85960149f1a8f4f50a6d449704bddf6e35f77d365769743bc1abd78905203447f48
-
Filesize
6KB
MD53cc12d19249015f4db6ca3d05c6cd144
SHA146aee5ecb0cc0f87b0053c1b47666f7e7b4dd3da
SHA256826aa30c2524d2282211035b23bb0f0d06ad6ab37a03b7b363a3b2942a7c7f81
SHA512ed9f4d9ad29f554af3519a708e1c3d6b70a2ca04e9473c9e1391228c3d447b493940ffd321f539ec0d44dbfd94755aa59d57d8c16248e79865c4d5c026571abf
-
Filesize
10KB
MD51ec5b140bcfac0cdedf865970af2f049
SHA174574c9735df93f13b8d3150d6fdfb7d7788b059
SHA25646163e186a103b8c9017378212691d4164f05270d555a53d1384e922877ab865
SHA512ac13f0c10acf409aca4e57a44c97a8e28b9f1f78766b91e8db7f17fb0ccf79bfe4554e5ec3f0eec26cdff559d92f500e4a336de37a0fad8eef72b75475a9c0b2