Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
8fd5c6bc3fcd6fe16a4d10c6ecf64d58_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8fd5c6bc3fcd6fe16a4d10c6ecf64d58_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8fd5c6bc3fcd6fe16a4d10c6ecf64d58_JaffaCakes118.html
-
Size
157KB
-
MD5
8fd5c6bc3fcd6fe16a4d10c6ecf64d58
-
SHA1
a4cbe5aadff819ac385bd6d078cead4ed6c8f4f2
-
SHA256
4c4f55a95c90c54807fae3614abc4ecfb72d647c7e19618a2f229108cff56407
-
SHA512
86316a43ac9992eb942a8130d7e890a725a3ba54b7dad4f7acfffec0f165365c496c2474e6ee58fea0d989629489554202e688c544f59e09d819859daf51f6a8
-
SSDEEP
3072:S/3Qh8wRvr3yfkMY+BES09JXAnyrZalI+YQ:S/368arCsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2744 msedge.exe 2744 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2328 2780 msedge.exe 82 PID 2780 wrote to memory of 2328 2780 msedge.exe 82 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 4520 2780 msedge.exe 83 PID 2780 wrote to memory of 2744 2780 msedge.exe 84 PID 2780 wrote to memory of 2744 2780 msedge.exe 84 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85 PID 2780 wrote to memory of 4768 2780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fd5c6bc3fcd6fe16a4d10c6ecf64d58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc77946f8,0x7ffcc7794708,0x7ffcc77947182⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1141251381371563724,10896079900658217079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,1141251381371563724,10896079900658217079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,1141251381371563724,10896079900658217079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1141251381371563724,10896079900658217079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1141251381371563724,10896079900658217079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1141251381371563724,10896079900658217079,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
6KB
MD5a5bcf53acd7488af78f7f0155b4e2bd3
SHA15f6a15a33bfc543ab919c3828ed230f53df8a18b
SHA25686311006aed15cf6ca03b6229dcc29f6b44a49c89f9b5496fb340853482eb217
SHA512a6ce93662b1e3bd610116df1a23241e582414fad793f05da4b27997d401b5782625fee424b51bd4a36c39c4a24b758086a900f31c3ad1fcec0a015548ef3a0b3
-
Filesize
5KB
MD53cc92c27c493f9ef3a6e5ee0b21ea167
SHA1a125a1bdede5b6bf47beaa519e7af674c9eb8a34
SHA256ba4ad639f6b505b4ed49a550c38c72793a00876bf0f6368a54e6386370fc7dc2
SHA512868b5b60498450060b5d98cd56c34bab8b9daad2743e7966c081ab7882d51f0ffe278a4707a48e2036628355c0ab446bdc915c8e097d40124579b70d4b476ec4
-
Filesize
10KB
MD524946880dcb266d296d99b292aec08c8
SHA19d72b94842839e6367da94d7dbceece9af2905c2
SHA256266de154da6a8cc18aac9c555a59c03f9b6af2817157d997edd215a2c09e9500
SHA51253bf12acf6e179db057c2218f577f1e34dea01541e746c7be9bdc5651b7007bdf36a7db98a81ccab06139f0bf34db0a3a62a5c63a23db51b4c99afcbb5db008e