Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
8b7d63d84219d15a2d50aa82ee262d14_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b7d63d84219d15a2d50aa82ee262d14_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b7d63d84219d15a2d50aa82ee262d14_JaffaCakes118.html
-
Size
18KB
-
MD5
8b7d63d84219d15a2d50aa82ee262d14
-
SHA1
31bad23f682475f496101cd4816ad4edea5f0379
-
SHA256
0038f3b70160c5a6b1f4bd2cfc319dc4e9fece995ad2c06fc61922d3caa2fbff
-
SHA512
2af5226203c413e4b59210087706b760165d923e67994926c16cdda3d02f48e8cc0f2406ed907ea62235a2a410e45c4f0cef47b827792e2200885c25751aa5ab
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIM4azUnjBhWo82qDB8:SIMd0I5nvH7svW7xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 716 msedge.exe 716 msedge.exe 2692 msedge.exe 2692 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4596 2692 msedge.exe 82 PID 2692 wrote to memory of 4596 2692 msedge.exe 82 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 2820 2692 msedge.exe 83 PID 2692 wrote to memory of 716 2692 msedge.exe 84 PID 2692 wrote to memory of 716 2692 msedge.exe 84 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85 PID 2692 wrote to memory of 1644 2692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b7d63d84219d15a2d50aa82ee262d14_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15751435504195062572,14184063326985487956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15751435504195062572,14184063326985487956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15751435504195062572,14184063326985487956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15751435504195062572,14184063326985487956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15751435504195062572,14184063326985487956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15751435504195062572,14184063326985487956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5a67322cb152cd1382afb0133bcba05e7
SHA1ebe3eef7749acf68a5010c31583882ffecc1d266
SHA25638e2336b58c2d2635fce0c70746b6c4c112117390396874742047acdaa330224
SHA5128f859f0bcce68c9424a3c7732388afcb18ea156702195565396c7da700634bcfedd345299ecda2568cba7fbabf3908c19c4039bed5fe1d11a6d9451834af4375
-
Filesize
6KB
MD57871b89a9aaeb63c12a225b873569ce3
SHA14ee5164bcca4d052f2c03c82212dc86a4b2da445
SHA256a0327ff772efbaf65a8853283a386000d792e87152ee90f8be8e791a78014e30
SHA51243ba33397ac290e0770eee9b73363f1d238490d86976770fe05ea9138f0955dd0f4f1f503970b2626e4c5d27aae55afd8c57baff72082506e939d9b74a73cb58
-
Filesize
6KB
MD545082fdd918b34e0a068059852b8b0c6
SHA1befcfc8f247829ad5b29782dcfbff8d3d4e7e3ab
SHA256d183d8397b8989f5d51adf0f0fd18aea9b9e793b986f4e90e52c33fe8abd2736
SHA512a6010486dcf986fa9410abffb12bf7538c46de9d23529408ba8ecd4a69a8880d184f830ce050d1296d00a50075efc24d0b7e0db57e8f6511b312d4f05c17367f
-
Filesize
10KB
MD564edf5a914eb965b8f5d10fbba1e60f4
SHA1d284366b737d44273cbc7f463a32b11dbd0f971d
SHA256f44744c835a532ca89c5f2fd472b7cf2c04ba8e52a1eb15f1fb41887e275d81d
SHA5129f907c9f02f6b275bfa34e2c575d4401ddd677fe3d7b6491e05c59d3599bb6746bb2221d393da1e54467cd1a82d617a4d6b09285ac4dca89945d34fc5a775d9c