Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
8e5de36f41a6077ac31d6f86963e40cd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e5de36f41a6077ac31d6f86963e40cd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e5de36f41a6077ac31d6f86963e40cd_JaffaCakes118.html
-
Size
159KB
-
MD5
8e5de36f41a6077ac31d6f86963e40cd
-
SHA1
de4e75980d9414b649af5b1cf47b4f778228a563
-
SHA256
fa1f5b2cad6dda5ce41505619657f6abada5502a7f89de64a0cefcbc9121773b
-
SHA512
90271a84ada328a585e554d243f53518bdc35ff5a41426bff486b3f9eabb092252dc03e9cf00c99ddffbcc299da1af631b52e0ba2744cf962a376d98195006f9
-
SSDEEP
1536:iVRTT0QZUus9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:iDPs9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 548 msedge.exe 548 msedge.exe 3560 msedge.exe 3560 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 1556 identity_helper.exe 1556 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3560 wrote to memory of 2272 3560 msedge.exe 82 PID 3560 wrote to memory of 2272 3560 msedge.exe 82 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 2784 3560 msedge.exe 83 PID 3560 wrote to memory of 548 3560 msedge.exe 84 PID 3560 wrote to memory of 548 3560 msedge.exe 84 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85 PID 3560 wrote to memory of 4684 3560 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e5de36f41a6077ac31d6f86963e40cd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1970029465383748631,12949881264652192931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\547b408d-65bf-40f5-9f11-f95af1b299eb.tmp
Filesize5KB
MD50dfdf52f31a94e9a84cb90c3f3bf94df
SHA13550aec5c56bcafb0227856d65a836910a99e972
SHA25655b6b797fc549a8a5731450dca48f0dc5b51c114867bd711e9072cf8b521c5d8
SHA512dda6031f8f227e0f54d7abd996a675c070c34ffb703e21f7e1849ef6f1d4b6c279ef9a0d29ba11943a49d375a7c403be3c078f3061c22eed5914115f0bd50855
-
Filesize
6KB
MD5ae9ba03148d1c6082339df89eeed9854
SHA1eb525c7f1f1d286590272d462bc59515b5b8257b
SHA256b8d93c2c739c53d6d4ce3ee918a4570172fbcf17e87f6a89fba6b7d71cdd4f1a
SHA512bfeee588a07de73978811d76688cce13d013f160e84f8444888072864a7eba716a0c7928dda7190e8301b1d967c1e6eb11dd27d3d0389edab9c4ddb7eed5e2a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51d20a5d25ea66781be7733f7dc89716f
SHA18fb39e4ca8f09ecb3ce7879b5b4451407d9c4447
SHA256ec5eee1983666de18f6da63645627e1938909e57efa1e817c15e7ca40d2ddc55
SHA51227cc93e841aaaf475b9ef43e66c9aa28ce15678020ff6dc3613c29c51a7965366142cffcd9552bf8053509c951ecbf9118c5b5aa1db0f1772704214d7b1c831f