Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
8cd2ce6138bcba6c18a129dc501c22dc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8cd2ce6138bcba6c18a129dc501c22dc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8cd2ce6138bcba6c18a129dc501c22dc_JaffaCakes118.html
-
Size
6KB
-
MD5
8cd2ce6138bcba6c18a129dc501c22dc
-
SHA1
f7e0907b593e427309748957cac9d56a0dc2b3ef
-
SHA256
533050986e1525f6a9aa1004c4b49675f5be1e7d44a74c3e7dbb02f6c451bd83
-
SHA512
ece8ac198c062c14538b32e5eb756aec6d606829a48b4cff68eb70423d5b1738f719808150767d00c3bc59bf642a5bdb9dc856a4336f468ea090c4fcb960ef4c
-
SSDEEP
96:xotvtHCFpKm8C0NHnVGv4wU4JltKGW58TFPSh68OiE150+EaBGYN4Ea/:2CpkddGawmm07aBa/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4548 msedge.exe 4548 msedge.exe 2076 identity_helper.exe 2076 identity_helper.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 4860 4548 msedge.exe 84 PID 4548 wrote to memory of 4860 4548 msedge.exe 84 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 2116 4548 msedge.exe 85 PID 4548 wrote to memory of 4124 4548 msedge.exe 86 PID 4548 wrote to memory of 4124 4548 msedge.exe 86 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87 PID 4548 wrote to memory of 1932 4548 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8cd2ce6138bcba6c18a129dc501c22dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0ee646f8,0x7ffa0ee64708,0x7ffa0ee647182⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4388 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16006683921277929120,4016126755669754273,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD510e9bc86505b900032983cbff9756ad3
SHA1cf8ba18051baaffa8dc4364300efebaac8b3f985
SHA25665dd2acc122619ce140f0c3b0d51f41f73afa98b1abd5cfe98c5bfa344e63d54
SHA5121274e7f09a7ad2c6a67723127d90c75a3b2c038e79f8b346da5c549e2408a5fa9b66c7d2c0e56e74e2fd6260f58cf8352964599afea5bec90d08fb988fbbbce1
-
Filesize
6KB
MD581ed051a8643816c1dbdcd87d0ea7e14
SHA16ac0eb693cd6c2499692330156c555827caad6bf
SHA256634b905f000402ffb57befd666ef0123bd0fc338af8454dff0579da07afd5932
SHA512378fc55b7ae653a60a9ffe26e4108a7c5f1e22e546036ae703ba9258904b7f3b3c2b3b0912c171f77dad6f9cce0fa85804f44034d96605430af5e40201406bff
-
Filesize
6KB
MD54d38666d3dfa913d41612bd824e382fe
SHA18ce0141dfd713fe93a9ddf13dad294ea90b97d18
SHA2560bc27169e83c8a81792b92a66e15fa9b16a642672650626863c843842e17804c
SHA512adfaebef5dc091fe3ebe349a42a4a3cf0504a63c3ee53273e9c48c51e8399828fcaf1cd9408869864cf9b3a59ad16c764806516cd9f3bbb1ca344e8b57749134
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de3f1114cd98b6d5b543a9675486411d
SHA1dd2f450059fa5e53fb7930dc2abf90bfba9908d7
SHA25694c6082e1808b9e2acf521f97bd560a4f3794be6fab1149d78bc925aa2c721b5
SHA51200291cd6e16a15a45242b57ae2db5d053cf27cdf07c78a58f609ca07f3f5cc46eaa66ce6c2c9c68273fd475a0ec38b516491882b1e65c39626c0ba30f2a9bc66