Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
8a7b84cf73c8471b760054d3315c2ece_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a7b84cf73c8471b760054d3315c2ece_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8a7b84cf73c8471b760054d3315c2ece_JaffaCakes118.html
-
Size
55KB
-
MD5
8a7b84cf73c8471b760054d3315c2ece
-
SHA1
c282f2333738d7141d4addeb8eaa3da26506cadc
-
SHA256
83dc1c7f66a419e739ea296285e4d99174c8d5d0dae9253994de0c8a02b27cbe
-
SHA512
f24589b57a49c1420b7a9f7ae7222b1c8a3f73c75cde8c8d246e2569b71a75ca122aae09118ca1569cfec4b65816860cf66882bcf9a53afdbf993ddb03ed5951
-
SSDEEP
768:ZsssssssssssssssssssssssssseNwhXZc2n9Q5Bs7ALaJtmLlU126sCeFYs4:0q/39QEALaEK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1032 msedge.exe 1032 msedge.exe 4808 identity_helper.exe 4808 identity_helper.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3968 1032 msedge.exe 84 PID 1032 wrote to memory of 3968 1032 msedge.exe 84 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 2564 1032 msedge.exe 85 PID 1032 wrote to memory of 1772 1032 msedge.exe 86 PID 1032 wrote to memory of 1772 1032 msedge.exe 86 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87 PID 1032 wrote to memory of 208 1032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8a7b84cf73c8471b760054d3315c2ece_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff974ed46f8,0x7ff974ed4708,0x7ff974ed47182⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7522164746073945189,7843308915929305074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
6KB
MD58096b3ef761a1b07d698430a73cfcade
SHA1732c5f896c96d84dba8657e0aa6a5defa3c5248d
SHA256d6b69fd8c83108e9149fef5cb3d962e077d953cf87cd84dc3b94c03b9936775c
SHA512d49d27cc4ce5c2625105a884ef51dedcb087bb800cafab78f0a5f5c1d50f3a0d03b8f0eb578e278ac20ec058f520b2d036ae6f80f8d09545fb98fc45670c6fc1
-
Filesize
6KB
MD5e89d25a301cd9a0dfc94133e0e107877
SHA1011895bda4279fb75db0522fae19ba404a8be8cd
SHA256d148d118a13d011950c16594d29e8dc02cbb913bb0fb25f38afe8a4812435382
SHA5124710ecdbd01031b14ded84f9d03b3175f1735fcfa918720bfe8a6c8b132b24727d9207876677bc0b8dd4c7b6486ad296d3fdb40b8f82ad6c250f92554a197a7b
-
Filesize
6KB
MD5d3985cef017a0365becb37b11999d080
SHA199f9699565ae8e50e84f2c1121d4d7fcf87dde7a
SHA256b628a0b027137b131cf3a86ae24c0d55073a2f5cca70f7620c1353a9e8d70300
SHA51271df3f7f5012785a17b07350e943e5037d9469f4f97a06b5c7a0746e6d210c3c84676cd2e6180b545b170744156786352f279cc14914318095ccf44c03862173
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d04dec987ec0afbbac7f5f2614e840f8
SHA1dd508f79c98f130fd6ca03802f98d368fcc56f94
SHA256db4dd4dfc74052dd1c95de1e9a8d5f1867f5863e3a3c1af1674da057fbe88d96
SHA512dfc6abe3ad1b0fc8669f232e68b2a875fbbe08b79fb4eb4699424be2e0ed64cd34206232cb20a92d65f78624f8df7557db3b7630e913d80d742643f82b36cc66