Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
8bd22e131010aa1fedfa2b56f43a223f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8bd22e131010aa1fedfa2b56f43a223f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8bd22e131010aa1fedfa2b56f43a223f_JaffaCakes118.html
-
Size
159KB
-
MD5
8bd22e131010aa1fedfa2b56f43a223f
-
SHA1
6552e3361807d5c0a9251f22e51457e109f446aa
-
SHA256
396a3cf78afd00bad8ee838858d01aaed679fcf39c225f84519aafa6ffd2ca6d
-
SHA512
fb9f992a7e3d883c79ac3d1570ddb019e387175fdec7629186ab51bd6fa8687f7b6076fc51521251c9d93e79a9c067578e6c586348ed8898d4204682f08c270d
-
SSDEEP
1536:3d/X64bdL0lyDNEFO2P1EFQEFaEFOEF5EFxEFVncVa0q6050b3C+UJjdw5owpLWY:35dL0lyDwwg1UBdw5owN24P
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 560 msedge.exe 560 msedge.exe 1504 msedge.exe 1504 msedge.exe 4824 identity_helper.exe 4824 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 232 1504 msedge.exe 83 PID 1504 wrote to memory of 232 1504 msedge.exe 83 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 808 1504 msedge.exe 84 PID 1504 wrote to memory of 560 1504 msedge.exe 85 PID 1504 wrote to memory of 560 1504 msedge.exe 85 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86 PID 1504 wrote to memory of 3092 1504 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8bd22e131010aa1fedfa2b56f43a223f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1976 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8979888358934301375,7732972076537808286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD525080d5e6f403dc07454f813426eae9f
SHA1a6a0255eb1a7517a77064aa56af40d2f4400bc1e
SHA256b29f842f50a67927dc8b991ccd36fbcc92f219edf30f4d35f7429c7c0426c43c
SHA512751babaa358c28dbbb06dffac52ed7ff130fa6c42fb2bff9f066d480b3542e6e3fbadea4ec3b442d1bedad05c25300755325f192ba014d0a6027c96a1bcc9d96
-
Filesize
5KB
MD5eabd17ff3fa8ba3b9877fb3c1040cbfc
SHA19f28835cbde4250b0b170342b32502b3c951d54f
SHA2568e94c903438f3659e12046bde83d9f6184c0440880d706619e15492de99c2ae5
SHA512adb350fed08b1522e83711a145d95f0c389e7c09f1c91690650a6d6b1cc6d0c582cbebf2c6fb0cb1b426d9eaf6a8ac81154cca6cf09ea25b9ecb0a9104b4f54d
-
Filesize
6KB
MD5ada08eedc48ab7bcbab5e7174f92b5ca
SHA1247686d3681219b1c0de3db08f1dd2abf40d5fd6
SHA256eda3c4949ca7a1b19fe119e7c4537be21ca89cda93c615c1349d40ae8a34167c
SHA512124b6f0eee4e70f7da8abd2e2f490b6d0575ca47f7a82a3e0ed3f990ef987a90e40794495ab7eb0c502dad57418b337c0b7b212f7b14332c0d3a639db112578a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5530f3a92dc35015e37cac98cd15a7ec2
SHA14e8326545412f109be9bf6d955748e9b0312de77
SHA25668eb8762ec164942e3a9980725407df4e6e79491eb1d85b0fe9968205254f315
SHA5126c7c45dab956882e3e5ae0ee3f1cd13bbc58717be4a9ac22267fa64070bad0bd95ccdbb31cb18730d93f337b2ea6c9faa43494bbf1d88d76957c35c89b49458f