Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
8cebd298da0775dbb8ecc14d18467fd3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8cebd298da0775dbb8ecc14d18467fd3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cebd298da0775dbb8ecc14d18467fd3_JaffaCakes118.html
-
Size
1KB
-
MD5
8cebd298da0775dbb8ecc14d18467fd3
-
SHA1
27c8f86a546838b4008e893d73f2dbd2e3e6c018
-
SHA256
b080ee8bf42c6fc7204029c42075c48b3c6acc18fe9a9975ee2d1189bf359fcf
-
SHA512
729ba25fe234b0a77d3f40e48594d26a055f23336688285415fe0c2833b43efbab582fd0ed48d18b33c969e41bfc0f2703bb74e1f8281350d28345b7f325f579
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 624 msedge.exe 624 msedge.exe 2504 identity_helper.exe 2504 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 2604 624 msedge.exe 84 PID 624 wrote to memory of 2604 624 msedge.exe 84 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 3012 624 msedge.exe 85 PID 624 wrote to memory of 2168 624 msedge.exe 86 PID 624 wrote to memory of 2168 624 msedge.exe 86 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87 PID 624 wrote to memory of 5104 624 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8cebd298da0775dbb8ecc14d18467fd3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8156b46f8,0x7ff8156b4708,0x7ff8156b47182⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,15405449707043228588,15127526721915802468,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ade14500316147cd689980190d84c6ec
SHA121cb4f9bda7b6a6d82603ce734971acf17a67ae0
SHA2568de33f9719e6e612277e293e69567bca599c8652f6e39448cd73e3da0b549ac6
SHA512b3019336007a5fe756597c08d7b2311e74eb3bc3885de2739e071e6bddaa03d974bf4a4241e955caa00e839e020a3c2de5767d568747bddb5effa6d42826728b
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD54aa7aa9bed6be647b4c8678a2e56d64a
SHA1159f535872e310ef7890e6c9d918570ee3262dc0
SHA2565633e87cfee422c61922f71c54b45d3f2b64fff1d1e02a55643abd32af2abf26
SHA512c86ef3185f8359dd6a24ee0d14b5c4f845dfa4b4f53259c07a7eb7225635ed81c03ff89ef17014c1faa906097628ffd266af628f6c2e2d8d3529028bf904268d
-
Filesize
6KB
MD552024d0137c654786069c97bb445e4d1
SHA1ee48022b57ba0eba158696d70f908b33d637abdb
SHA256e66fcf3b0aa14290640bd0ee8ad4348bcd3ff223d37218c38fc02f6e0ab114d4
SHA5120061df28e2d5527cbe5235a240446be48c70010c2711019e4e7604bf0d4cf451b2ae5ab88d1972a8e14b2946cba1e57a5b17ebe3db10cd0f647b1f0a1ee8067f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23