Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
8d0c8b760cde50f434f4558f9e36797a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d0c8b760cde50f434f4558f9e36797a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d0c8b760cde50f434f4558f9e36797a_JaffaCakes118.html
-
Size
23KB
-
MD5
8d0c8b760cde50f434f4558f9e36797a
-
SHA1
c1555dfdb6dd1a04b0365bb196d86dba120401b1
-
SHA256
5788cbae8f68061df380732c1602444dbef876b76a0588cec416337075b5522b
-
SHA512
ee381f87cbd1abb1af33e0de19932d77792d8db609a9859ff2333237846020e01dedecf48ba4675d8438a863579115d6a43aa60ab960c044ad86dece7101ecee
-
SSDEEP
384:PlF+8zi+rz3JtVPpYwhfZPQ/EeG7e74Cs7H8Zoi5JOhAiB1C7e0g1:3Cs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4424 msedge.exe 4424 msedge.exe 4376 identity_helper.exe 4376 identity_helper.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1536 4424 msedge.exe 82 PID 4424 wrote to memory of 1536 4424 msedge.exe 82 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 2752 4424 msedge.exe 83 PID 4424 wrote to memory of 4836 4424 msedge.exe 84 PID 4424 wrote to memory of 4836 4424 msedge.exe 84 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85 PID 4424 wrote to memory of 1996 4424 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d0c8b760cde50f434f4558f9e36797a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4d6946f8,0x7ffc4d694708,0x7ffc4d6947182⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8525605679336045566,13271548305999195784,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5dfa0db3e25143ada4829d2f25f5ab7d8
SHA1d5646b8276e6b66a261d5cf43af9c69b51557326
SHA256bcbb3579869d72b30b68d748e9ba789cd26bfb0c209879717b6b9ddb528917d2
SHA5120f52e275ce736c39e8d196f382961880ddac1742868ee28fa6ca210133c5933792182555d607bd6236b00a5d820f6e530e988c9895e68c107dad926101d69a56
-
Filesize
6KB
MD51641bf6fdb77f6921d6d6cc301060e9f
SHA1dc16909821ca28b0e1c74c46063ec743a388115b
SHA256d76735a4369568435355a7f16ba28e0ede5d2b277063cdfaa0ddd0d51b402f73
SHA512d05ef08cdf443da515006bee1fd0a67ac4110873fcaa0c0ebd9619cc7f7ae864f56b8a25b3dc2a18f6ab59c4df362505109013e2d00b884f53ef3081efa71b2b
-
Filesize
6KB
MD5e51bcdf584a419bfb5dc88329a32b309
SHA1f6799b63713b6ff4ec28584a73c73eaf09edfe6e
SHA2566bb0acf41797487cb04505dfad954353a8f01e936002cea2b23d68a40b57962d
SHA51288c73b0bd40d6709b3272f2df4fe652ef85ee07d2e0ca3625ca6145b2fd4bbfcd780a7f3d32b7be2e5103e7e5a1cdb37731119b5eff1e858cb19b6eb64025249
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d5bf69039a00813623878ba6f14ce1c8
SHA18ef39e715c6af521968cf0f72d7c71acce2fa046
SHA256775255dbd2053cf92619932c400a6194deeff9d4c3a53f45133708dc976d2d37
SHA5124a7b1e421007ee62f5fe3f2f02a3f1c8184f17c0aee31dc64edccf017018677ad125e621331fd187fe90a41a483e051951bdc2fe4f6a22dc3514ed1573648842