Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html
-
Size
17KB
-
MD5
8f63173b925d152c70fff4bbd4bb755d
-
SHA1
191b2b9e6d39512174365e68ba451249607e933b
-
SHA256
adb9d9049dc95b71311cd6b136db6573fa6ce36c714fad4b1ef5e7e2804999a0
-
SHA512
61421a6afd9a1cda32ac47bca2b14b088298763d755434f53f5a0d572630cb59f54dada4a30665734c925f44de3b7f5302b190bf21aefabcf2286dcaf954ef1e
-
SSDEEP
192:Ekd9kF1QixElkEyX6KrzUbpCK2zMgHkQsQ+brUYdTX/dzPpzs3:Ekd9deEe6KrzUbpCK2zMzvbn1zPpzs3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 3960 msedge.exe 3960 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2076 3960 msedge.exe 83 PID 3960 wrote to memory of 2076 3960 msedge.exe 83 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 4812 3960 msedge.exe 84 PID 3960 wrote to memory of 2984 3960 msedge.exe 85 PID 3960 wrote to memory of 2984 3960 msedge.exe 85 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86 PID 3960 wrote to memory of 3080 3960 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3586963057167233818,14731876316800980365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5ae3460815152dbda75d6baadeb267b9b
SHA1f99099ec85c818c631d0d95c9ba8814672f5ae33
SHA256e9af765e581ec4430a2dab2f679dafb5fc617613b04aa16a09e5aae5ba09dd43
SHA512b15a38726a65caab31e8bc99dfd748ff1c262aa2955e2baf4c43fe9d98b813d6b3dab6423deb7afa3e11c74eb4d505a7134b88749d0c69e78f48d3a1d36c1add
-
Filesize
6KB
MD5a1f5dc15a7216756e25a4b526a9f7ba4
SHA14481d77cf88c00a9b224af11e1552c2d29da42b4
SHA25609f621d15f2c0113b312db9299ab37b47c60adf38e7b906e3e3c6093e5ea3ec0
SHA51224b5f0e22ec49bc325dcce0fbb0e39ec4e7de9034b6dbe18be41c1d2be93859741d3d8f878045e0ab01adc74d0682ab482d536331e35cd1d73cbfca3d12ad076
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58baa1d4e1338e36cb8a575778afa2f19
SHA176d203187c908231f7c121986654d317f85f0677
SHA2560aa2709bb78c757c65f1f839544d1f429598d3a48ea9b2f1c4564467e0a9482e
SHA512fb3837e5278cfe693711265e493787794fd3a8cded7ac2ef7e094d5c0e86bfbd6accb3980d7443ecba8c0cf6f79187545f5d0905bd4a36a429d3a4fb5526c5b4