Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
8c74fe0d26834efa296b12433a2061fd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c74fe0d26834efa296b12433a2061fd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8c74fe0d26834efa296b12433a2061fd_JaffaCakes118.html
-
Size
45KB
-
MD5
8c74fe0d26834efa296b12433a2061fd
-
SHA1
49db8e5a13eacf1440a6dddadb472bbb414d620a
-
SHA256
4effb6fb96a73eaa036defa454931c3a32d6324a916aff1be6bcb59372308c64
-
SHA512
8ce26e86a0a30a2596cff62436c2fd62ace4a100e43863200f4504bff0f4654ba31e3210c66dd67dc64806b80cf09d3629521fcb25504bade4daca1467fc2403
-
SSDEEP
384:7wRA4MzFx/z0kpGX5xDzF5Joncic2XM13gYbF203LOOwRA4MzFx/z0kpGXd:7LB3/zIXDFKcr13gaOOLB3/zIXd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 452 msedge.exe 452 msedge.exe 2348 msedge.exe 2348 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 748 2348 msedge.exe 83 PID 2348 wrote to memory of 748 2348 msedge.exe 83 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 2104 2348 msedge.exe 84 PID 2348 wrote to memory of 452 2348 msedge.exe 85 PID 2348 wrote to memory of 452 2348 msedge.exe 85 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86 PID 2348 wrote to memory of 4324 2348 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c74fe0d26834efa296b12433a2061fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6127694176873987884,7191495198967902609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6127694176873987884,7191495198967902609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6127694176873987884,7191495198967902609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6127694176873987884,7191495198967902609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6127694176873987884,7191495198967902609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6127694176873987884,7191495198967902609,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD59e4a8120a1bbc87b72fdac3fc0d57ea4
SHA1fdb4bfabfd1f9bebfd6426735224c9e624a9624d
SHA25615449e84c61b0e0271fb22654281fb4afd50d986f6cab3786b510aa5482ff74d
SHA512db020481f860304e279d1a890f7249082b4060b1873d24718ae48e972078f6ef4734d37e9f96f5ed2b80a1f71e2121c7e6a9619b9b48e0f8483bb45bf1e00217
-
Filesize
6KB
MD54d95c2794c1e02e28523f1025f634e22
SHA10032b3a89b499ec7b06014431d5cf19676dcb6b9
SHA2564af2ff8d6b672ecc57bfb0c8f5235fbef2e40d8c4dd3fa80b25d6e412b98b5ba
SHA512fc8be480c77bd5ecc9328a0ee058b271fb1f11876662560768f07f4e0546c2894de39512860f271dfa361e5b15106b4ee877c412c6329d7419126439ea5b9a64
-
Filesize
6KB
MD5433e117979cd1c918871bfb282402971
SHA1480a66453228c55e981d3cbe6b0a4ed2e8d7d3a3
SHA256b103b018e6536734b8ab4beca185002cf937b7159afb85306e0f9824cf4028e9
SHA5127f6dbf45e57ed8dc04b76bbdf417b559eb80e1ffc4ee6291834a22f775937c8a6b10002990413c182db0a0e9ace91ff5b1eae43445ee6faabee56ef7dffb88ea
-
Filesize
11KB
MD551edf2dea7fc24972fef8c5246daeb03
SHA1d4f6c286757f93e7cc57b6f7100faa0926c800a9
SHA2564f1fb5a2555719cc1b9041fe35edc0fed35edb43637e00f779a243047904d9d4
SHA5129091645c2f6bc1cc07f2aba2b77b1fd4ccfbb5fbe9855fb7db02cbe50cdfbb3a7a0e44a11adeadd8d659d0b65053b4f4b670ec6c2f6d05d5aed978b06ad30b86