Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
8aa9fa2c8188a30510ccde3d1320304f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8aa9fa2c8188a30510ccde3d1320304f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8aa9fa2c8188a30510ccde3d1320304f_JaffaCakes118.html
-
Size
106KB
-
MD5
8aa9fa2c8188a30510ccde3d1320304f
-
SHA1
051c6efdf8bba8545fccedd27c4aabeb2021fcaa
-
SHA256
f85ad30f8e2696f84365696aeb3b193d7ab695f3dbd9e87261d3cf82f66b0f8a
-
SHA512
be52b5566ae318041bd73b1d30f9bb21ca2c4426c7399db1e369d5d644dbdef66999f9c171a08423fe4869939631732a756d87d5e2ef55f916922c2b8edea9f9
-
SSDEEP
3072:y9rp5GRcCPnBuCMxglOce9sFr4x7LIFNNGBgH16LLB:y9rp5GRAN9sFr4x7LIC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 448 msedge.exe 448 msedge.exe 2616 msedge.exe 2616 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3464 2616 msedge.exe 84 PID 2616 wrote to memory of 3464 2616 msedge.exe 84 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 3640 2616 msedge.exe 85 PID 2616 wrote to memory of 448 2616 msedge.exe 86 PID 2616 wrote to memory of 448 2616 msedge.exe 86 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87 PID 2616 wrote to memory of 1136 2616 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8aa9fa2c8188a30510ccde3d1320304f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,13581802780021395462,17269644109980225335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,13581802780021395462,17269644109980225335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,13581802780021395462,17269644109980225335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,13581802780021395462,17269644109980225335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,13581802780021395462,17269644109980225335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,13581802780021395462,17269644109980225335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
1KB
MD50ea153775913c48c5664ba814cf87b55
SHA1de15d8241e5fcef422eacddb94b8561aa98c9c5a
SHA256ab46be1ad55ca975f1f4e65290037940649ed3c3e2e48fc41f5bc325b920798d
SHA512d974daf9d3a3689fcb5e2174658a7cf07d1e925e2ef47492a4d0aa21a2b4339d354158f8ccb9f94d52b82324a91ce017ddfcb5a991e80cb9a60f8cf8b8b23400
-
Filesize
1KB
MD516263335fa46bfeb08455c48837afbe5
SHA11af4c1b3e971b1b19c690b1ba22eb80a417b86fa
SHA256811292ab7f7fc5485bb6724e08fcac4035ee13399bafde75d136f84a88a2030e
SHA512b5229b483ebfd1c8265cd08773179a8a5fab199d2e4ccd542551bae8acb068fe00f36f5abf17067f837111f70cd2103070372a64c4b5cbc8b67e5f73c06cc16d
-
Filesize
6KB
MD598b9fc838e598047398a92b3d55600f6
SHA17cfb442be31e4fd67161aa55c8cd5a597cbba16a
SHA2568d2b23a464f58db5d109d41251be03b4024ae217d56fc716eac6d43a7e4015f2
SHA5123f19b8d9414e4eebeccf73c0c403492a16b3a1711a726592ef923109eb9f1157c38f2614afe9fda1cb1948ce54685dd8d57756a001d46fbebb3708acac720b27
-
Filesize
6KB
MD5e345d3ce4445b845c115fcd8dbeb3f00
SHA1fb13cccbcf695f2d2a3517e42f453dbd7b16673f
SHA256c532e1f2488124510eed170676274d1b42b0608e00b82690efe1d5fe644155e2
SHA5124f968b54b1ff95c6db204ebbcd122acd3c5b14a5abeb8008431f128871ddec71f0071c39150d9fd79cc5ddc4b211fb370a5a0b5f25c62f56146526fe949b7ca7
-
Filesize
1KB
MD57935fa557c4cf1b2e48ac8ddd1b142dc
SHA1541e5a8b03c8f6f28a03f4f9276c2ac4a3463dbe
SHA2568df800e9f8ea50db8a97c3b1e6de113e6cc3ce15a30341426cff02996cada180
SHA5127e3648e360757ac044ba6021f5ea021540361461431dff1d86b6f75f47d3e4012f27d17d0557b191f7ef9a3faa0028b221f7b6df711bc92148e06bf90a1077eb
-
Filesize
1KB
MD5b9faafb6565102cbbbc052cada02fab7
SHA199550e8ee5023298c5261b2e0013d854c994522d
SHA256f04c334a63b2065c8bb6e33b9d1acaf9b24c86a747cdc85ca84187045ced85b1
SHA512c7d7c9eb946d9145db7422084b2f2119a765a46b4ac8d29056c6f51f20bf8e67a9554fb616fee3b0fbd54cdf1436b7ce34ce482234921bf1e88880b771b67653
-
Filesize
10KB
MD5559266288585a70818181869fee74f5d
SHA124d1dae00c794d4780fb83563c86391ba72228b0
SHA25608d4dde3ec82878eff6c6dbc933532c822d3a640e3dc5cd7e5df8669b374ca90
SHA512bb1800f6c972495e5f218ad2caaae8e01ea5221eb8e650935e4029785214990b6caa3bc9e600f5822771b8f16b2bf7113d4531f832db92ee299c05aebb17457b