Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
8b1e33cfbe8b686231c5bdb059f4e4b9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b1e33cfbe8b686231c5bdb059f4e4b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8b1e33cfbe8b686231c5bdb059f4e4b9_JaffaCakes118.html
-
Size
20KB
-
MD5
8b1e33cfbe8b686231c5bdb059f4e4b9
-
SHA1
34f07de5cf034820dbfcaa7bf4f6c85ef07d5299
-
SHA256
413c27468789bd7365268c729bea796f22d19e7363eb9776ce14f5486e0badcc
-
SHA512
2a2a6a6b6c816817b8309c660e6b101eb54718c0eef3cfa38ad34bad363dbba68d377c3563f0bfd60ec1e24f5977b1c2f7bacbc42a7bded43989cfbc7e965e46
-
SSDEEP
384:1GypM6LyfZG3Pz+TkTHAd+hx/X3mrREdB9mg:YyprQGoeHsyVnmrU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 2932 msedge.exe 2932 msedge.exe 1612 identity_helper.exe 1612 identity_helper.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2356 2932 msedge.exe 85 PID 2932 wrote to memory of 2356 2932 msedge.exe 85 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 3004 2932 msedge.exe 86 PID 2932 wrote to memory of 1540 2932 msedge.exe 87 PID 2932 wrote to memory of 1540 2932 msedge.exe 87 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88 PID 2932 wrote to memory of 2604 2932 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b1e33cfbe8b686231c5bdb059f4e4b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90de746f8,0x7ff90de74708,0x7ff90de747182⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14179600504508135909,12643498604896716112,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD508c8d144b52f67ae13da07bbbe264292
SHA10d361b7edc26efa22d7accccfad8334de07a1e9b
SHA256c96e7e7ce69c280904877802c07d7affeb0f653675804260c9c6870403c4fdc2
SHA5128826ceaf3ab6b640eb8876b52773b664490bf728dbde06773908e7cda1a38452166fe37638197118a7d7b38c5aa82bbf18aee35606ad4a3496a5b13f433c9559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD521b1f5b7a47cd72bf350b807d0151da7
SHA1ff4085bf6472495861c29af61b38bdafed7be700
SHA256f1e4f8b8c374c156e9d30f2276a5ab300d5b5976590d74871d5068c8059beffa
SHA5124efaa5f5a89ea9e29f100c788a8a920d76a7ec5bf823981a7c1c5dfe93c55e19c9afcafd14dc3ba74a68bd0a481465b3b6d2f27a1e15e495c75836c9c352e4c1
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
928B
MD59f5a987dc4377051cce125ec8d434ce6
SHA1b4d398a83d97331dc744a47861da6f1c70273aef
SHA2566f2709277cf9e4d4eaf8f68ddc777419fc7c15d2b442dd0b0d3449baa8b0b1f5
SHA5128f6a9477436a3a37af4fcac13605967fe41ae568bebc834c913b008c420f863b9243c62b522a07ba9be11338254434cdec6908c792ced3dbf66172a51d6d161f
-
Filesize
6KB
MD5cdbca363bc151397866bb6dadf6e3e44
SHA138898ac7d5fd37a3a4807fb28575abbd70656721
SHA2563ee0a6f8bb201251fe20f721746a4d5da3916354ad8b653c00afac59125f3fce
SHA512d95fc13cc7289d720dedaf1aa8479d2360fdc9cccd8ba44e9b4cae636dd4fd062631f7ecdbdaf0a95cbc617b8de6267516d3c9aa6720a4abf16721c0263c616c
-
Filesize
6KB
MD52100b8c466072210bc2aae9460a4be13
SHA18f7a6cebe1c8a81ea1b599a1296254a708f59ee9
SHA256a45faf5548afc28c7650e6211b9a4b57ed331dc3ac491d2d88bbce1de19ffaa0
SHA512bc4035d8c830e78e45d876554a014bd467cb19307752baa5f8dc5881200fb4b7374ad7b07b1bb696e07928a149fd5416f56aa8b5540decac5c4100d9465ca7f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD522f23e1fcd806efac56ed015fb681be2
SHA1fa854c8ed5d89dcede28843fe8baf8774998db57
SHA2562c0616a7b7563dd91fcd663731e08e8c77772ab68076027df70630a341127c15
SHA512c34b240be426ca3475cba6ec76e7bbf7e5a7c28bab162047c13d4bbc873ea6d8bbd5bd8f22ee3db82215c277dca19f1c00742ab0340cc13c32535985bb5972c7