Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html
-
Size
45KB
-
MD5
8b75e303aa30fddce4d9edf923cd2ee0
-
SHA1
431d8ef6d8a0626f4839e6ce6625659e2012a93f
-
SHA256
b86243e662c5e2e0522c9d5df93f78ccd09fe733ef7c9916feb2aa2c55232b07
-
SHA512
5a720c44f43c70c4e9630cf5a5bd2a59485b14cf7761317db7fd0e5f2b78dd03a1a77b768bdc8d4eac254f0e1d38562b8fce1285e0e5ffe34c68ca95da3986b0
-
SSDEEP
768:CvxUf5kBqkD2dpjoPAxIT0rsrjM7rorxbD2LPA:CvxUBk8y2wT0rsrjM7rorxv2L4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 644 msedge.exe 644 msedge.exe 3020 identity_helper.exe 3020 identity_helper.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 4768 644 msedge.exe 82 PID 644 wrote to memory of 4768 644 msedge.exe 82 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 532 644 msedge.exe 83 PID 644 wrote to memory of 2248 644 msedge.exe 84 PID 644 wrote to memory of 2248 644 msedge.exe 84 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85 PID 644 wrote to memory of 1396 644 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff2ca46f8,0x7ffff2ca4708,0x7ffff2ca47182⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,989416367149205821,6105571663300742182,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1440 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
313B
MD5dfe7ae46d3b6959e8bc0acebbe5bc94b
SHA14da5f8be37fabf4ee9bcb0c7c987a7cac93265a8
SHA2565878172f0c05cbb1b8d2616d9bf28c2db3c8c718da309c5907f5839f45e93249
SHA512e56fb5cb50d1b36206cd5e8724d00e3cd6b71b7877c2b688136ab5aea55053c0b9d9e79fa9eaf127c5f8f167cca618fb06edfd61dc2e7d0ba115e2d27d575ba9
-
Filesize
5KB
MD5f4256595794d641592a930f2405be7b7
SHA14e6c8ea413fdc45c173d32a12c4943fae34b1894
SHA25671dc1e3a5ba1e4caca7047b35a074ef3a88417216dd0a9d57e5a92929b149712
SHA51250bfe51b1d8d9c2cb04949cf054f3eeae84b4135e3313835297ddedd4dc6306ce72bb909c3ebb8ea6ab4528e6360e446912ed6b67726cd9adb4b44b20de80ba0
-
Filesize
6KB
MD5808d1f41b73ce191459f235a321d7759
SHA1a452ab3dafc2cc0235c3996c01f28e6ec2ac19e4
SHA2567f7a77cff3ff304bc0390f740612aee674f1154f6986b8241ae889de5cc26720
SHA512b3de43c28c4c584782126e7b084470231d4bb2030849427d0affbe3fa15931c60028cec31abf6038ae7ebb56045df5ad9b4f7c6aa7bb73642660a044eb29bd17
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD552b6ec2f0c168dc93257ccf3104e4a10
SHA185d26c07c02621351dc5fc6aa763841efb02efed
SHA256a78a2819000b407a3c2feb42265534dec7ed87304091a183dded391c99854f6c
SHA5122ca195272ecceb25ecf8fba9f4fda7a2f8b888527406b420ea3aa7e978c780ebe47653ba10cd40004e531b61fea9b9737e9dcda5ad6110c5b497bbe7dd49cd5b