Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
8d75fe3195e545b2fb0af19efddad04e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d75fe3195e545b2fb0af19efddad04e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8d75fe3195e545b2fb0af19efddad04e_JaffaCakes118.html
-
Size
201KB
-
MD5
8d75fe3195e545b2fb0af19efddad04e
-
SHA1
ff7d43ca86d6efab73613a390c03c36bc9f8f94f
-
SHA256
f85a7d73e9f8403b31e769fbcc95eafe10ccf09c888e43965e4631a52f692599
-
SHA512
a22e48ab5312fc6b8c95364064afbea21caf3221e15a48e1be5beb5eddab313cf2405d3174a5d56eec21febecf17abf14d8202b25b1a6da24184b2eceb18343c
-
SSDEEP
1536:ka6hd4oQYW4GBuokLOTCvsZeOdlmJsihBPS2TbT2UGvM:dyTzV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 1140 msedge.exe 1140 msedge.exe 2408 identity_helper.exe 2408 identity_helper.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4408 1140 msedge.exe 82 PID 1140 wrote to memory of 4408 1140 msedge.exe 82 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 2788 1140 msedge.exe 83 PID 1140 wrote to memory of 3840 1140 msedge.exe 84 PID 1140 wrote to memory of 3840 1140 msedge.exe 84 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85 PID 1140 wrote to memory of 2720 1140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d75fe3195e545b2fb0af19efddad04e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17903893970760082976,7660136841783898285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD53951048f5d02afcee5c1efab62d296d8
SHA112dfe9c1818435061ed1d4dc539f558764b59a13
SHA256d55bf1cfb459e71e0f889327c82a834292db689546daf86e5a6ee812af98c06c
SHA512e0f9c53eb754bbca5e24e5fe3a887c73a66dc24d6d16142ee02ead3e38980a1f61e9d49024d51081aae3ad2bf1925cc0f8c2379e7cd73ae1da3012d153aa74aa
-
Filesize
6KB
MD5c9f20ad38bd20b12087f51501e9280f8
SHA1fa6fa685dd6343f70159a6c98262a064ea8129d8
SHA25696b31f588753b9021514c36e28a5fe40ed337f88ca1f5c9a9e0878f7d25286eb
SHA5124d99b7db4fa7b92b6ee7a565c875353d9a3127a57b44046fd1c625fcdc9439a9e87362aac148788f3e0ba23ebab8a791a964257cba4c181484445e5571fcf181
-
Filesize
6KB
MD5028d0e10db93f1422475ab5fd0ae6048
SHA15012601a087da7f9fab21b271613a8f5f6e52239
SHA256e8ccfffafa46b083c334febf4fa97e6f2f72e0ef13cb405e4e02b1fb52ed54f7
SHA5122be5550b50fe91c6e9d767726b2c1e7adb79aab1eb800c1045a3b87eedde2f5e2e5bb6fdc4b91691b82534458f81b8c4047eda9742a08f922519789ed1dbe21f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD543ea2010c945708f2460e60c12d89a66
SHA183363b5bb876559a49bd7b7e5ba98a8d41685c07
SHA25678e249f403dd3283a8805733c34bf53b8b1f0e155d35757d86e72b662ba9a10c
SHA512beb655ba7cf62be30c0b215144d9dd83b5c1df569cb4d943af443689ed1f2ff6ba380c0c02d645406e8e0f8501168843ff4b52936729220b77f1b2469f2b532a