Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
8d6ff63a9474107cdd846011c5b275a0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d6ff63a9474107cdd846011c5b275a0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8d6ff63a9474107cdd846011c5b275a0_JaffaCakes118.html
-
Size
136KB
-
MD5
8d6ff63a9474107cdd846011c5b275a0
-
SHA1
681e9ca43b5c7a42d76828f8ba8989af38ebdff2
-
SHA256
4a70fd28f9e056549b06bab3c62adeae800e2abd03350fd2b3187b4cb5dd48e3
-
SHA512
f29e7045abca2d99c75533b232f0be46914c50bf1cb94a63054d786908fd5b3b17f8d9cd6c3fc9e2b6816e66bb05a54c3cb430b857d439a77e30fa4eec56a597
-
SSDEEP
1536:S0+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:SjyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 2392 msedge.exe 2392 msedge.exe 3932 identity_helper.exe 3932 identity_helper.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 316 2392 msedge.exe 84 PID 2392 wrote to memory of 316 2392 msedge.exe 84 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 1252 2392 msedge.exe 85 PID 2392 wrote to memory of 4552 2392 msedge.exe 86 PID 2392 wrote to memory of 4552 2392 msedge.exe 86 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87 PID 2392 wrote to memory of 3684 2392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d6ff63a9474107cdd846011c5b275a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,8713151691973449754,17739872037658938453,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5f29546d9b7e245dcef7a8ecd8fc327dc
SHA144bc828aefe2115b2da710b1037c232e3b684c1d
SHA2569873938a61e5ff708a3c8408c365ce7f5b95c659b755ee6c710825f0d20b61c8
SHA512a082af14e0d4905f3e24a135f7476d70f7bdd0881a4825c3f65a2bec1406ae250bb9dbeb923846685fedd1b15a0ac3f2422d163efa6cc8d3bbe226448d876e84
-
Filesize
6KB
MD5288808aa3ed6a95874d8527015c1057a
SHA107c53ed62589f7c08f9c1633805015a7699c8e94
SHA25664fdfd3d9d27b32923368cd2a6b17a1640a45e591f11aaf7f61e12f5424b02a7
SHA512e435dfe9c7026ccca7e9c364f597ab6c73d5b9e9d3ca8a2114e70725bd922ed6a73c29ed120a935820a98ff9fcbb7a4bb75d3e2d3e03afab1407e45feac19cf8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58dcbc64ca18c6bb33c61c5baa3f47a87
SHA1aff979335077d597b1c6a039710e3f32892be03c
SHA256673e6c8e10014b049d6b8680311781d34802000bb6b392e7c152fa12c8d5a8a4
SHA512b2133b87a29b86fb0783280d3571bc5121fab65cab9f726f66e7a39512c887103830df628910800bf691037a51ccee9698b503be315c40b56ed5f857f8760ded