Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
8ff42512c274c5f5f75f2b2e6ed85989_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ff42512c274c5f5f75f2b2e6ed85989_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8ff42512c274c5f5f75f2b2e6ed85989_JaffaCakes118.html
-
Size
58KB
-
MD5
8ff42512c274c5f5f75f2b2e6ed85989
-
SHA1
7dce9028b687e7277fbeed34360db8c8108f69dc
-
SHA256
5a85efc808f9ea0fb166900144a82b91ba35626b3e0e72815f80c047e527bda1
-
SHA512
2f795fdce6cd26fad07ed10c1c895a3102aa086e47008b0efbcd36ba4590eeb7e56aae1f5ab8363a36e0c82a92089f9e94cee5c5250e8fe5f0ebce5720667858
-
SSDEEP
1536:IIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZ4nW:r4nwXKgHlD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 216 msedge.exe 216 msedge.exe 2804 msedge.exe 2804 msedge.exe 3984 identity_helper.exe 3984 identity_helper.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1188 2804 msedge.exe 82 PID 2804 wrote to memory of 1188 2804 msedge.exe 82 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 3572 2804 msedge.exe 83 PID 2804 wrote to memory of 216 2804 msedge.exe 84 PID 2804 wrote to memory of 216 2804 msedge.exe 84 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85 PID 2804 wrote to memory of 3884 2804 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8ff42512c274c5f5f75f2b2e6ed85989_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff05446f8,0x7ffff0544708,0x7ffff05447182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15574004845057604964,2195791526856981177,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
308B
MD5f6762933bf56442973760c1d5d1421ca
SHA1f8acec1c2a1cf5c349ccc2166628c584bf5fd54e
SHA256824bd693b3417ba906953108623f6602b397663fb600f6f1d3154f9502b1d3be
SHA512f44188b57f29175bccd74f6a5092c9015343a2924f2fcc92f2530e97c4f6fc635f62741f8cb52afbd5fadf250f4f36364c24f865febff8051701fbe8fad54d83
-
Filesize
5KB
MD514a7b82fb767735c5719fc74fe5ba2d1
SHA18288ff11f23a261349fc54b656be8ffb6f4484a0
SHA256efaac7b85d271f9cc65d9b776af9b32a11f8b3053eb5d4b1434367c05c0b0934
SHA51274801a0004843a0dde9a49aad37209ae649550f565d526cdeeeaa92a9c2a67af468b781ce8ddc95c6f28687914d1cf3c91807b261cd2f1a40de40344336f0dca
-
Filesize
6KB
MD5a38cf3316872b0e12ca8b416eabbae8b
SHA16483c791accca7e69ee6551061b37c8db8d6f90b
SHA25660f2aec4bc07338e2fc01699f66c6372a525cff9638d4c08cf9b4e9a58ee9b6f
SHA51207c20427849e036f7fd29ae9ec72846bd4fb2e024970cc72eac07660da4271d411ee875823ab8db89a61d3c0e6960078d9a6c3803969e6d2d368615b9b2a3692
-
Filesize
6KB
MD5356c271f81eca51210c51c810a7e947f
SHA19cd4876a408e85a116bd8633b1743d64e4484d0c
SHA256ce8b2a20b973c77a2f6335dea6dfa79a42a7fa8b407d2be61f3384fe7885aeee
SHA51274d6b3729cfcc2d0d534c0ae72dcbec3919abf13c6b400ab7acbbddc931f5e557eb7a3ba76834ab0ec28439ff2e04545ef603ad023d6c160b7c0d6a1636a1eee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5468490221edcc58ca9b9866e6ec5d3b3
SHA15d21c5d36a51b4552809206591529f8befdf2428
SHA2560b6ac75d92b1a3e777099bd61b9bb0ac396d5a13274d51755b75ea9857514b64
SHA5125dde7f2984b7962981776d2906e01bf2f8d046aa5c4fb9f250dab346d400fabe68ea684bf12af27218e060835eff2b6e6366d02ec3086b039471c0eaef77f0be