Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
8ff90ba695a0cc24237ec2a7632b4a79_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8ff90ba695a0cc24237ec2a7632b4a79_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8ff90ba695a0cc24237ec2a7632b4a79_JaffaCakes118.html
-
Size
4KB
-
MD5
8ff90ba695a0cc24237ec2a7632b4a79
-
SHA1
6f837bb6bcf94393e7c5f14d187fa6954bed3d93
-
SHA256
d743f20c833a3df778a7e6420a5d69ce9cb73784daac869dd3f4ee54ff4814d9
-
SHA512
d841671ed1768c03175bd73fc35a77f8d34bf3dd5c658e6cb8127b5338dfc50d75a4cbb14cc89f327e802d06d7fb52ccc00f20796a1cba8620ad1695e76735b1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRzdxNjd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3292 msedge.exe 3292 msedge.exe 2744 msedge.exe 2744 msedge.exe 4704 identity_helper.exe 4704 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4676 2744 msedge.exe 82 PID 2744 wrote to memory of 4676 2744 msedge.exe 82 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 2576 2744 msedge.exe 83 PID 2744 wrote to memory of 3292 2744 msedge.exe 84 PID 2744 wrote to memory of 3292 2744 msedge.exe 84 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85 PID 2744 wrote to memory of 1176 2744 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8ff90ba695a0cc24237ec2a7632b4a79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8da46f8,0x7ff8f8da4708,0x7ff8f8da47182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1804 /prefetch:82⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2368 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13997304744154576000,10669000635767786871,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
292B
MD530955098076dfab5295ec2e767559410
SHA192ea34d18c3171eb49041108618a61088e86b1e5
SHA256db70d33fa0c36da98066634dd076457655ea61e30d5e02ac7cc907af27aff6cf
SHA512ef6fc0d9e48a67eaf30a9088003638b0f9226cd35761c3c86b6bebd6ef5669ce49e55ae5dc5f5e653427d450a508fbf99e08a666aef155ce1d5ddf32d3f7441e
-
Filesize
5KB
MD50493295e95307aa4dfab70ddb3115bfb
SHA15dc29f15e577c2ed7dfec796eef2c54b626e191a
SHA256a30c2b467a016ec06366bde3541bc44976a28e0e363b83f8f8817dc4fa76743f
SHA512604c3587d1be486881218fc3c22a23d0b1a31107f8573a7ebf4c8b9cf7b8151a4332d500bd814bcb7d46cc4a7135b3ffb54b6836b6049509694ee3b831103af9
-
Filesize
6KB
MD55fe06c1e2b50933c1216c29bad3a393e
SHA14f79d7816bc84b0eb01d840b14ccb3585d6c9ecc
SHA2561ffbd523749a5ee6b72d53cc9cccec4bb2aeb8f3350c72da82141fffe9731b46
SHA5128e776648b8ff5a2df5c2e8223b0d0ea27d87853aa516e7c58c1b65d5400436307c0fdb962c2b23e11d179276c12c05a2da5d39c260fd86175ac0f4e11742200d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5bd5ef29308d0adf061332279e1d6187e
SHA12641faeb559dd289234d746d872f11f693a840d1
SHA25636f9d70bacb6dd06575b40191ae0e689ba89ea8142a78dbee33b8f9e95dcd704
SHA512ee44a3c9b48e616c69e876b636e766be9429757cfe0ebdd7b50cd84e916ef1da727c7809d9f33328744d6c5e308467cbf372329e43705a22854fb9e725be9bac