Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
8e469471216bd220ce1940f554b2631b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8e469471216bd220ce1940f554b2631b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8e469471216bd220ce1940f554b2631b_JaffaCakes118.html
-
Size
22KB
-
MD5
8e469471216bd220ce1940f554b2631b
-
SHA1
be82ead566363599386042836a222f62df61ff6c
-
SHA256
b3d5b5ab731406d3ab6b035a109f24a68f0205918f2c4ccfa7701ba7e48135eb
-
SHA512
e0a22f385bfb7ac6eb1193f25b72f924a6c9fe802653db365c82fbdda05e66d685f99062f5ccee490cd9389811ec69f37de000db0ab107c3d80cba163dd9cdae
-
SSDEEP
384:ERXqvQwsUjPZyA7SVJPK+n2LFqEE6bJEonnyUMuecqL+YttaZEpOTwvTbV9P12Fx:eqvQUy1K+2vW/bZ9GGON
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 4468 msedge.exe 4468 msedge.exe 1440 identity_helper.exe 1440 identity_helper.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 3424 4468 msedge.exe 81 PID 4468 wrote to memory of 3424 4468 msedge.exe 81 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1132 4468 msedge.exe 82 PID 4468 wrote to memory of 1184 4468 msedge.exe 83 PID 4468 wrote to memory of 1184 4468 msedge.exe 83 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84 PID 4468 wrote to memory of 4552 4468 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e469471216bd220ce1940f554b2631b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea93746f8,0x7ffea9374708,0x7ffea93747182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5337361053309888842,7930832657170505382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52213ac9a9b4a0b1d30e8700ce364f2a6
SHA1398a9124a1437273eb6ec175b8b833cb52533e41
SHA25691e6213f9b42924ecdbf0a6260f7218e660d25c98d4195afda08eebdb7370412
SHA512776c4c1f4426a4e5e40df725d51e1c3428b719b1692fbf8add8feeabdd17667b5822e01c89b62a334767e9958189faa01a7d949aeec9cfa0389fa2593f89bad2
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
181B
MD530f245817a32398e1aa30c422a6b1664
SHA1db76f596c151a775be1a93ad3e761f6c8a5354a2
SHA2560e291c3e167a87963bf5d68923cd46f89948773958da17a1060defd4855d1e3a
SHA512d895008655081733ee5af40844164bb70863d34c4a38cafedc8d6a5f68b4a16c6968c13e088675c6e857d6600b38025b32d86686064e51b0c31ce6aec60f096f
-
Filesize
5KB
MD528621e31da70b73a0cd51a0224e74ec6
SHA16f11beaf1533387e24cb789e85f580d14afa637b
SHA256c043fe54a41e901d8ce15e8b8c725a69da4dcffba5d44d6cdc789921dcdcfe6a
SHA512944b855cca19a1adb20969af1396a21e4a51560da0197b037ea25690c39129be6f2b390f6161c489435fb4b8201e5c17a5aa1b09090bb9547bce67a3490bda50
-
Filesize
6KB
MD57257d57bacb54ed4bdad28bc2c1e040e
SHA10e0c12c44189d7dc230fc98bfbff503b016fb58f
SHA25623aa2dfc2767eefcc6a7f254a22292da13e6f8153afadd6391a380180cdbfd79
SHA5129394ef7771beda5ee37b980dd18bd6c127d808d06378c20c39e01bae2d8ee7e0a7b171341e7a8e946519a1b918b9963b118d24fb31b3e979f9772b8dd32cb66d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389