Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html
-
Size
3KB
-
MD5
8d1441949aa8ae4754c3d665fef94cf5
-
SHA1
d82b4a4db29928da198936cbab584d63bada5f93
-
SHA256
fb1815bd2765c86fd1b44f11c06c5e63ae6c33f97a31512e6fd8ee26545aad96
-
SHA512
9f5e71c2a020109608e841f65f29e4ffe227a523ac22b7fad1c61d05738603be5a3a0bebb6c215907a9bafa39a07ae9b96847c1ada8d595fce67410a73c09a1f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 4772 msedge.exe 4772 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4324 4772 msedge.exe 86 PID 4772 wrote to memory of 4324 4772 msedge.exe 86 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 4672 4772 msedge.exe 87 PID 4772 wrote to memory of 2624 4772 msedge.exe 88 PID 4772 wrote to memory of 2624 4772 msedge.exe 88 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89 PID 4772 wrote to memory of 1860 4772 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d1441949aa8ae4754c3d665fef94cf5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff969c346f8,0x7ff969c34708,0x7ff969c347182⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2604 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,746999332904851830,7845291858240538744,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD5747cd081e7b4dcfe1216f9f79922f901
SHA1dcb6c5ff89bdfad98ca4bb1fe50445577857142c
SHA256cf9bf88cbe0d98296ba2fc7a7cd8fb008db14ed1fe16c9a0eaf7ede555e6b705
SHA51212da4c4a3230ae19223015f13e5992121adfb55e088c68f3502e186d769ab531da014df788c7029aecd436b1a7f25851f08890213477c2ad752554ed4f622772
-
Filesize
6KB
MD5138c27f82dbdf1e5a509234a061900fa
SHA11646aae0c166b18471e1dc943dd903d11efc3b5a
SHA256cf483cd28ceb650528c6b73f314055edbc107cf4e2fbab878825327b60f29990
SHA5120981e0b9a9f40685e5dce2b8a257b30d1a45a6401aa77923f5abecb6514a6bd0c00056255856c5194e2af05137f6d06ba68190647d199837c070fc996e7b6ebb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5972b1c6728f91ed0a669faf7a1d5e049
SHA1470a22dfeab0f1eb7effff06543b1a528b3b006c
SHA25635bd597df1f0831dad50baaccde397e12c8df1511300e53b1ac5781c90b8b3b8
SHA512ee0ab6a1f8ff819e86fb843cfbc593a311d6467998b5102856dd2b44e01ad0f01b17e6056d1c007d0c10e697120d3cfdfc7a64bb12606d624cc3e2439d3f94be