Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
8cbfeffbf101b68e1be96d99d0078687_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8cbfeffbf101b68e1be96d99d0078687_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8cbfeffbf101b68e1be96d99d0078687_JaffaCakes118.html
-
Size
73KB
-
MD5
8cbfeffbf101b68e1be96d99d0078687
-
SHA1
389c3299f4e0683a62d6f203f96037943fcb98a8
-
SHA256
e9d527b518b4e3a0ac614976f00e5fa77d9036f3e2ca9d6f3ce4ebefd0d52029
-
SHA512
8500ec22b78f3daf6ccc7531cab81164eeb10b2d1741091de8a39387b246a97207b71d47b5817be8c88c1242751b19a382ecb7ee66006d6d2b6490b0ae45d41b
-
SSDEEP
768:JiFgcMiR3sI2PDDnX0g6sT6GHwqtRoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JjUTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 684 msedge.exe 684 msedge.exe 4580 msedge.exe 4580 msedge.exe 2448 identity_helper.exe 2448 identity_helper.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 1728 4580 msedge.exe 81 PID 4580 wrote to memory of 1728 4580 msedge.exe 81 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 1312 4580 msedge.exe 82 PID 4580 wrote to memory of 684 4580 msedge.exe 83 PID 4580 wrote to memory of 684 4580 msedge.exe 83 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84 PID 4580 wrote to memory of 5032 4580 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8cbfeffbf101b68e1be96d99d0078687_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11573580029603453227,5571310857936576718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD54e444f27f9d2f1b4b24534ce2b92eb17
SHA1ae08d7d6045f3ba18963eb9cb5fc0e9c6b35a6ad
SHA256aa512a1173c9028a965b52b507ef95c74b63cafaacd67834ba84f2876388099c
SHA512f3eec46c6a1a42e4c67831108b0e38b0ebd3e8e01faa68bb7e0d6a6dc91022a49568e21dfa25ae0627f7e55dd73e093d16711b55042dfa6d9f9a20ddcbc50c1f
-
Filesize
5KB
MD55c8fdd7c34cf3243f2ef42c5eaedad10
SHA1a6dc5eacc1658559e9225c0e19b38e7ee6ee76ab
SHA256dd0c5332d40e53a08f74a2db8bb42d94f13cd85d83b3e9164999a02112604f07
SHA512725c14fd6f649d031985a3529c80870c20e04cd71c8b111c176e2097f9a01ee12fa36a7aaaa827254d3b3799211bf6bd458247d89b7ebe560661de3a610e8c71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bfd595bcc01cd004557da7bfcd69bd9d
SHA1f8461fbf1b105dceb70f0f7cb4af6e7e6cd1cd21
SHA2562738fd2b5c32e2c4b7fe92571ecf5c6b33760f0a580e835a7bbc2459de77d32d
SHA512156b512a24ed4acbc49f3ee43d37fa1d8331843caf56c2c4be9a2d6721f6956508065ab9c18de8b5d081f8145612b6f8047d3f92a973c976f0989631a5024b2d