Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
8bb62da38319bee46dcea3b3b1a64516_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8bb62da38319bee46dcea3b3b1a64516_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8bb62da38319bee46dcea3b3b1a64516_JaffaCakes118.html
-
Size
461KB
-
MD5
8bb62da38319bee46dcea3b3b1a64516
-
SHA1
75b9c658028dd72848923fb6d3c97ae8256a9264
-
SHA256
ac8eaaaa9ea1f8f6be39354d29d54e657116bf88e426a8b2b0132b361adfdf9f
-
SHA512
a2ddc7189a6081b6d16c3423c02217db7b542b19875aca255f14a1db1439ee2d4eeaf5ab6f52a3a87249ff35f27f5bfa4baacb9b90c78867d7e0c86d0b22b7a3
-
SSDEEP
6144:S8sMYod+X3oI+YcRTrsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3u5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 4416 msedge.exe 4416 msedge.exe 3660 identity_helper.exe 3660 identity_helper.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2068 4416 msedge.exe 81 PID 4416 wrote to memory of 2068 4416 msedge.exe 81 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 2324 4416 msedge.exe 82 PID 4416 wrote to memory of 3696 4416 msedge.exe 83 PID 4416 wrote to memory of 3696 4416 msedge.exe 83 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84 PID 4416 wrote to memory of 2972 4416 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8bb62da38319bee46dcea3b3b1a64516_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac3746f8,0x7ffbac374708,0x7ffbac3747182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9485073554840897472,2571964853576033307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5400 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD562ec42151f5300c2d0c2d22e26173309
SHA1d3b3754965bc8c505e4b21ddbc778b964214b021
SHA2563e6f1b3996921f1bf262246de0bed39133570b5c35fb9edf17b76802ebc4b237
SHA5125beb73ae22bfd21413beaf720d3a0d9f7ee69f2583f320e70c6c39d8c54b5bea02057e022291982426146ba0198fe02fab393df2fc59f1fc62246e5768c8bea2
-
Filesize
6KB
MD54a93c6b1aa8b3ac13b8f1220e1de1b51
SHA1679c65a9127a6c75080131abf8ed5cf1717198c7
SHA256f552ecbba761a497d3694428fac3f7a4677b376e0e6ad758e4086d494f1b1495
SHA512e1386853a4ea24bd00a9d3a0df9cddad38adf56b9741e19baad93f57d9388094557904121ecf9f0160b16853707a0c5a35bbf371d6905c00ef869c6a1af00690
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56f694ff3dfa2ade796487495f1e55a4b
SHA1b974a66ae75f4a0fae43c3cf5b267b69f01acae3
SHA2563e171277fdeb24f3630a42f3167a443a00070a625d8c20e7e76cf33b1321f2f7
SHA51236c9f1a7bffa9af474023500d7e6f21a0568edaa74fb5f3a8aa501e584c7b298b5e37934365024eeed64adaff74ea9d52fe99baf3363329a976f8d49879ca921