Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
8f4b370de3ade3c316bca483298809b4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8f4b370de3ade3c316bca483298809b4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f4b370de3ade3c316bca483298809b4_JaffaCakes118.html
-
Size
18KB
-
MD5
8f4b370de3ade3c316bca483298809b4
-
SHA1
c67f504adf2224e149432a755659482a94a7df36
-
SHA256
491ff96ca47ea980e16ddab2c276ed07081ec075c1cbac959d6a04c54e81d654
-
SHA512
c99262cf70cded404e324021ab064f172fb30510dfe90ca4a36b4b6f1109f83d420a0d99029e962a9d2bab5fd3e6f7d4a20cf3308b6e93a4f6036b5e339fbe52
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIL4dzUnjBhnZ82qDB8:SIMd0I5nvHNsvnyxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4872 msedge.exe 4872 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 5012 4872 msedge.exe 83 PID 4872 wrote to memory of 5012 4872 msedge.exe 83 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 3308 4872 msedge.exe 84 PID 4872 wrote to memory of 4428 4872 msedge.exe 85 PID 4872 wrote to memory of 4428 4872 msedge.exe 85 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86 PID 4872 wrote to memory of 1836 4872 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8f4b370de3ade3c316bca483298809b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,6082551966786876935,12040027652394470279,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,6082551966786876935,12040027652394470279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,6082551966786876935,12040027652394470279,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6082551966786876935,12040027652394470279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6082551966786876935,12040027652394470279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,6082551966786876935,12040027652394470279,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5666dc00681a96329dd38df6ad093576a
SHA1ae2d82ed41c1e9394f2f1f0673d73dda1e2b4230
SHA25692d0db93724182a537dab1379ae8c54411154e8619ad2f72311d250dae33d8c7
SHA5128d3e1cdaf42c92bae027480a7343f0f07da1ff33bb9f295be17a2b447249c893b4786072808f2c0e34b30b9190623f719a0ea9d1b5ed64f869e528aaef54d751
-
Filesize
5KB
MD53c7d975a31f932a958937d69aa0f22c9
SHA1e4b9aa368827b6c41c50d7656afb171245309aba
SHA2569cf623fbdd7e7627a9ff9b152ed8b67395868c60dd892fa2cea026b3c5c6feab
SHA512ed8b1dec3980365c83aeb7598a9b56337ad6704be1dddb8291a49a5c112c1d8d5bf88588133ecf9a1b8ad11c5bdb37bd3bc854a9aad40bb4f2b3cb85f8b44375
-
Filesize
6KB
MD5a0177f27acf69cb92eb31215b7b659bd
SHA14e8ffdb12b492d7d50a1be2d1efeebcb86569153
SHA25617ec2720d6533e4fd9cb4d7c354d4fb7824b9f97324948e6010a66929089f284
SHA512fc45974fd4c306e61f94b8b43d727e4e5d62c2f6524b29a31697dd053781c69975c067d8c804cfc9a459c7643a686a04abee8b834f2f36bb8d176c448f8a418d
-
Filesize
11KB
MD531d2fcf145e9a4a1590f1765f01d3592
SHA15a141df0d33edef8323c727848594283e61aa878
SHA25696a1468f2157332cd4a196fd23eb5b7dfe47aff75b01140273a41d758a0efa08
SHA512da861e2d29737c6ee0624339213f418baf846bedde2fdd9c7d9ae3065804895d5d44e8cab741462a8a1e6847905caa5a17b27f019fd7c8e18930ed0773cc2617