Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
8f3c149bf4886748cd85e74ee146ba2f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f3c149bf4886748cd85e74ee146ba2f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f3c149bf4886748cd85e74ee146ba2f_JaffaCakes118.html
-
Size
4KB
-
MD5
8f3c149bf4886748cd85e74ee146ba2f
-
SHA1
a429fdc42eb59e224ae20fe603ec86c1c63da951
-
SHA256
4fce91a5552f135fd232a33bda0e4dde1262b359e081131710f9dc5bdd352b43
-
SHA512
21e2e3a42e91b8fcfd66ca7af7b46acfa4ebb3411d97530713d4beda148a672f7a5744d40520701921ca20b64aee965b950602ae59a5a869b30aba572a389ad3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oJKBd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4500 msedge.exe 4500 msedge.exe 3740 identity_helper.exe 3740 identity_helper.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2408 4500 msedge.exe 83 PID 4500 wrote to memory of 2408 4500 msedge.exe 83 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4320 4500 msedge.exe 84 PID 4500 wrote to memory of 4804 4500 msedge.exe 85 PID 4500 wrote to memory of 4804 4500 msedge.exe 85 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86 PID 4500 wrote to memory of 2692 4500 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8f3c149bf4886748cd85e74ee146ba2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,860918883283636003,11368207433318077191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
292B
MD559f33f9721145d30e82066ce7765e1f8
SHA1337d7125522d66cb667dea555deab29dfe9d4e3f
SHA256dd83be276541c7bdd58669e17879dd3a1665ce577e77162926b996da0b9d02e7
SHA512901744d1292cb946402775c62014d88443cc0d506e377e1452502178be2d2281c39d83e4df9a2b5f080262cc4ca6bfde235d7c659c013f029307ef0716d0879c
-
Filesize
6KB
MD57cf666cffee79416a8797dce9dd6d1b7
SHA19e992b3fa9bece54f88552b0e41c6781b9e0cd62
SHA256a5e8d09f462187f80292e010d47cc0aec3aa9c63409ddb5e1f6be7e205408c21
SHA5124bd85b3c77bd9b71400213c5725e6806667a2e39cd9293b9b94e7caac33174c43e9e89353d6a7bbd2dc4b2c4cdfb33978e9757d65e43b9281f7119845232623d
-
Filesize
5KB
MD563d27bb2900d0320bf785441dab53786
SHA1f995e9ed5cd0cc04ca5d667daf2d3e5c853cc0dd
SHA25615b05bff14b042f1962805a1dd79f9dee13bc00df86391fd117f299eb6976e27
SHA5123a130ce48ded77fce30206a7e1040f02dba09ee3d342841c0605abb5a602d15855663d89de36005891aed23e47427da731a52c1604d5c2354f3e041ff06b4389
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f4938a12081e82ed98267bab7b947826
SHA1a6fb537ee89de02fa56880d087ae88887f7b7c52
SHA256a892fb89774b9b1143059ba33a69e3d1b3a7f4e48a4301ccf9cbd790036e94a8
SHA5129d491682fb203632102b0c91d1c012d8e0c1065bf8af6f852f4a83b7225d60689e336645883810685f37b54d8fad1062decf0df8782e37145c27bc9f80eb7e08