Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
8223ead3c13d663e923c76158ff9ef4d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8223ead3c13d663e923c76158ff9ef4d_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8223ead3c13d663e923c76158ff9ef4d_JaffaCakes118.html
-
Size
321B
-
MD5
8223ead3c13d663e923c76158ff9ef4d
-
SHA1
3780ecc6fabcd4b1b6ad888abcbcad32cbcf030c
-
SHA256
0ec967ccb7cff760832ed66f411889c02721d35f693d8657f03a47b8d54362b3
-
SHA512
0b74c08be4a086c46fcec4f71098cbca44e1eda4e05bed38b8411b00d5c9ce2ea4deba52d8122603fa49d43e3d8e5b1d8a7af7335e51111b237466ace0e25992
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2760 msedge.exe 2760 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1452 2760 msedge.exe 83 PID 2760 wrote to memory of 1452 2760 msedge.exe 83 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 4940 2760 msedge.exe 84 PID 2760 wrote to memory of 2768 2760 msedge.exe 85 PID 2760 wrote to memory of 2768 2760 msedge.exe 85 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86 PID 2760 wrote to memory of 2520 2760 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8223ead3c13d663e923c76158ff9ef4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0aae46f8,0x7ffb0aae4708,0x7ffb0aae47182⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8699906660976849064,6805725421353129700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51177a50f9bc98dc9c4919750d184b3c2
SHA121ae44055ee1198c45555082f9b0b532cc103605
SHA256bfae7afb6f7977f91e3e80d520ee429a162667fee52dcbf0b43026f53ee3874b
SHA5122cc5532ee3eb3edc1a79a63799f9606990f959aa83b11904f06b9fa063045cce64b4d29a2ac76fc03fdf7df2451606adf14d03fe58f0499a3abb70c441ac6f03
-
Filesize
152B
MD562fb7b4e610b65d04313440f9f100db6
SHA103719b095aa5bf869ab4e3eb980d2bd882a35050
SHA25651479fa5b853161fe08d1cafaf0f91651adc59086966c94bb67546e39d3cd678
SHA512a4d4341fd7cb7dfd61fe7f0bc56d18cf2359b99890a8d0ab77b1fd76851f446e2b907c750853b71664a14480a37f7345beed2075015753c5a6185160fe50f0ab
-
Filesize
5KB
MD5981cde7e643c9de4cca233a4884041ad
SHA1125783817eb46e76a4d5dd74c6933d87a025ecff
SHA256aad77fc9be9a19fabbbfdef76e442275bdb6cede0a23f3d35de4bb8b0e99f567
SHA512ee12c36c8787e48a807dc14e35f1b38bc1772de346345dbe6c8c0362d2804a1f0883836a07749da8ee6f8631bff52989d87cc3959b0a845fe4ee784c946ecf22
-
Filesize
5KB
MD5e4db5a26bbe82de16df731a5c90b6e20
SHA181a221c79187a3e372d794d4656c05ecd4f9d509
SHA25673e830406cd188ea157b4c8c930954fb148e4823db18e014f5b1dd3f23ecf159
SHA512895541486c9d8474e229fefe10537b3159ab603311bc47e40870ea5fb1163f52b2e7b975186bcdbf0596e97c50914e425475a11fbfa9c1c2bbc583f49bbcf865
-
Filesize
24KB
MD5d4b00b536f5f0a085529b7986e6bb2d2
SHA1939ce002f522536c9805f1c0d69a255503fd6bea
SHA2569f5592b0a3cc461f64b6863457754679e84b3569ecdc47f296c164af7441ebf7
SHA512e2fe20c702e1a388b810bdc416438b84e390e145065313651830ec06598fec1218c870bcc6ea33f363a160d47953dd42189d20fb64e2a8734555230c76c71219
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\beaea317-4bd6-4409-aa10-a20e7ca6665c.tmp
Filesize111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5e7a92b6504cbed5173b4d5ad93b27495
SHA10a98bf71cfa2c666a17b914c7a2ed58a78d97d0a
SHA256ade8eb4fde090d994ecee18896416fe1f159250291b88364def11f7e2d81a8d6
SHA5121bd976c7878c75a1a627445d82e4b2b00c09ba41c755e87af0bfd37c7f5ec37788676727f6640ebed710ed90f309bc817f63fbfff47ea2061e6f02721dbe4407