Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html
-
Size
214KB
-
MD5
8bb9a13f7a00e6fa40b9b04a6df1441a
-
SHA1
88c39bc55e15380bd5d30772bf7ed81fdb05d963
-
SHA256
4eda357d073cdc16d4381b90a0dfc1490a6c4069d0ee0c0594365e104d9d8d2a
-
SHA512
8796f90b48265c7a773ee02c7d8be7a2c71a616eb81aa994b79556ef4f5ec63f7aea4ac68191d194855a11156bbc3e9b7159c05aca407e27317bd361d1368867
-
SSDEEP
3072:LrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJy:/z9VxLY7iAVLTBQJly
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 1616 msedge.exe 1616 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3304 1616 msedge.exe 81 PID 1616 wrote to memory of 3304 1616 msedge.exe 81 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 4604 1616 msedge.exe 82 PID 1616 wrote to memory of 3936 1616 msedge.exe 83 PID 1616 wrote to memory of 3936 1616 msedge.exe 83 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84 PID 1616 wrote to memory of 2068 1616 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8bb9a13f7a00e6fa40b9b04a6df1441a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec5a346f8,0x7ffec5a34708,0x7ffec5a347182⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10387514983234616705,2694664556973621138,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10387514983234616705,2694664556973621138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10387514983234616705,2694664556973621138,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10387514983234616705,2694664556973621138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10387514983234616705,2694664556973621138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10387514983234616705,2694664556973621138,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5a62e86e114039dac1c44d17b7dff6984
SHA1ecfdd177e4f3cc628625243513804d5f1cbb4cc2
SHA2561b3dd0ea7ae6cb7c10a0de1ba0a019165ddbe9aae8b454569f6673cae5f531f9
SHA512f3bed964c26381ceb01c887b565b99c8b00c7d82975d705ff5762886479d3d83853fc87effd9325271cf0c7495341189dc2322364aaea46f713cba8819c54ffb
-
Filesize
5KB
MD5ab73b18aebafdd37fc6c0be0a0a6aa09
SHA194160147b33792c817aba558171c26f004065c50
SHA2564b839df58d1e7ecbefe4ec8e40e2d6f815a8e8d22646cbbad470e2362a0d7084
SHA5127320586851d14206a5f7875926d45ffe75a8f8691b68b27e275a40906b28b8fa3a951dafc372e6f3531203203e16ed5fcff8e9ec14c18d728a7b6d32bc772765
-
Filesize
6KB
MD51f4c63afcc69ac232aea74096ee2363e
SHA1f4828bbf25272f46799f85c1e21c9362e2c12752
SHA256db69848f1cf0b8da53b467cd48db77e9e34dd28ad5564c63ea9883253b9957e9
SHA51218ff4afc5ba03ea6a6408c3f46fe3a122631de9d358160b3d65f29178252d31919f2f1fa2af5646f7772441ae7b052a3e7c8f89802d05e6e608e2f4403f14cea
-
Filesize
10KB
MD54b7fe5f277d16b5b9cb0a4a77a99e95f
SHA1e856fd9a78a8bbfb0da926beaf463eee58cd0a8c
SHA2566d3c80a5594473435f444696dd0e0202babc48017c65789ec75e2dc47612d456
SHA512270d20012050c79c5941ee353f84ac290a91c318d0cbf3b92e81390d8eacdd80fd9ea9d339f8ef8dde2f0081aecafde357e4e772c4e149781f96834e57f7dd9d