Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
8f7a35cfc97bc3c8e7cc23de90f498ae_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f7a35cfc97bc3c8e7cc23de90f498ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f7a35cfc97bc3c8e7cc23de90f498ae_JaffaCakes118.html
-
Size
213KB
-
MD5
8f7a35cfc97bc3c8e7cc23de90f498ae
-
SHA1
aea997fbb91ecbedf139cdd302487ca6bd030aff
-
SHA256
638cbb80e49126bc186784d11dbeab34d551f598914aca30bccd5615b5ced22e
-
SHA512
540f6ff524bea0b4c6291b4df76c084e0d82cfce6ab497159113cd07d848aef285d467a8e5d7d02d80a42a609d18cb70ba431986a021e183cbb4147670fa1a73
-
SSDEEP
3072:S1WNi/Acbs9pyyfkMY+BES09JXAnyrZalI+YQ:Sw05Y3sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 756 msedge.exe 756 msedge.exe 4360 msedge.exe 4360 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 3128 4360 msedge.exe 84 PID 4360 wrote to memory of 3128 4360 msedge.exe 84 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 828 4360 msedge.exe 85 PID 4360 wrote to memory of 756 4360 msedge.exe 86 PID 4360 wrote to memory of 756 4360 msedge.exe 86 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87 PID 4360 wrote to memory of 512 4360 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8f7a35cfc97bc3c8e7cc23de90f498ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xfc,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10720828973588204201,8457843281941663666,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10720828973588204201,8457843281941663666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10720828973588204201,8457843281941663666,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10720828973588204201,8457843281941663666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10720828973588204201,8457843281941663666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10720828973588204201,8457843281941663666,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD57fc84b2592adf46b8ebe6fa456bd094d
SHA14ed1222e480f703fcc43a1439ed3a4ff3d5db024
SHA256473f35707009b0802a5e01b53c26672d36510f099c85097884d92f6961de79fd
SHA512bf8cb470ad2f9112dc083c025b8534d346eff40194e99432dd020fbb1cd8a74ccb77853c1d76b9a6e648765dbe325167f8641f2e04773ec7b4bdbc86c13316c8
-
Filesize
6KB
MD560891b87ca9e33f8dcfb5f80ffee342c
SHA159936dee011946060cfefdd8a7def662ee5c9d9f
SHA2565bda81fd52e4b4f3ab5bdb6f038300a7d6658e95c0e0119b8260bb91f1dead29
SHA512d372f7378ed409feab0489ed1abdef31fc505e493b16f8a84d080f515d5ee1b9a93115f62552a4b5681371d78674122a6a6e41b699fbc1b996037cf09c8a16c4
-
Filesize
11KB
MD50a8132cdd3b9aa71bc7758513409370e
SHA1f02aceee43e70c9dd1982c8e13fbf5384cdc0494
SHA256a84962a344d83f2936c3b9185720597361a12caea81e7bc97970c9839c17f3c2
SHA512abf0b37fed8b34f2e4681bb151fd1689f64f9719f3b4dd36a1588a0ffd1532b1b8293f7c7d6d625d1e59fe5fd95437b9694f41e4496c8a7e5d859b1fefa6e3f4