Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
8c6c4d7409773856d2f535b8a87836b0_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c6c4d7409773856d2f535b8a87836b0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8c6c4d7409773856d2f535b8a87836b0_JaffaCakes118.html
-
Size
20KB
-
MD5
8c6c4d7409773856d2f535b8a87836b0
-
SHA1
9daa270bb161308c53ace3ff77b7703700beecfb
-
SHA256
91d6af97138fe3bf380a59bdebc81a4cf9e05f186cafc1793625e79383ebcf6e
-
SHA512
3cf3e39ab487fb1ab0c41841e4728dd2d8b2dc42ee96f5afecd1cd5bb7c60d0ce336a5f117d32b75da81d4464e2e614205cbbfa57929cb1b693c49af57d675e1
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIk4azUnjBhWY82qDB8:SIMd0I5nvHLsvWrxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 3440 msedge.exe 3440 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3472 3440 msedge.exe 82 PID 3440 wrote to memory of 3472 3440 msedge.exe 82 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 4488 3440 msedge.exe 83 PID 3440 wrote to memory of 1696 3440 msedge.exe 84 PID 3440 wrote to memory of 1696 3440 msedge.exe 84 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85 PID 3440 wrote to memory of 2332 3440 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c6c4d7409773856d2f535b8a87836b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda88e46f8,0x7ffda88e4708,0x7ffda88e47182⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6c950c90-7aa4-48fc-af59-f557949453c7.tmp
Filesize6KB
MD5665689bce5c21ffd5f1d6794ec4d4a84
SHA1091c5839cc943c0a8d5dc8c55dd1e395cc018087
SHA256d4ddd675ebc6b327caed38ca009531f67a322dd7ee6ce992ac3a7f119ce5c89e
SHA51202cd8871e1dc3dad176dc1bbc8a0d340627ce951b6a79e3f950b68d3785f9890a5f6da129fe2b5b0a558214fb4be8475bb94be648899e910d90bfc533a7577e5
-
Filesize
5KB
MD53ba52adf235cd4a26f3292edf2fe10c7
SHA105b8c963635f25db3fb9e0c749622e7cdf6bf20b
SHA256b8c5293e9b5687919136bb8b8836316a2c42666fa781d1e9e894f7436f12d115
SHA512d8a1efd2e4d23d493ed2c8e105a81ffa5995bb0c886b7d97dc5098aef06bede92974645247d99dfc0d5fa1b2e25a5fc99f3a52faf383fbd884a735a1fc1b0927
-
Filesize
6KB
MD53416575a48a74c9ba0f54700d7612f87
SHA1c35002c031aff90505c332e6d29b919035c16d6e
SHA25649bebd791df9d7b83b5ad3740d5b5046274f43a8cad0973eab67a80aaf5c8ea7
SHA51261b30d7f0544e886af8a96721f3c1fdda79f40af704e3df924dd522ff778388b0b3f8869db8fd14848512ca7f4293147d9ae28b172c035a9c4b690882e8e57fa
-
Filesize
10KB
MD56c8a256b1260ac67b594476799e6e5e7
SHA1845f430dd9880cbaa79a699f539fe19068520fbd
SHA256f9bf8da65bad68ed6895b095c9983e0ad4c53272679d3bf2363349b1ffb95745
SHA5128b7a0cbf1ed28ad7b4440ca038839551c1c3e1d442289e42bc9e738dce02e51056a9b1852bb79cb7c694c24f2d0db373b415f975f03cd06a4187f6442d9c06a2