Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
8d4c705ddf8c7775887bedbca627e6d1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8d4c705ddf8c7775887bedbca627e6d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d4c705ddf8c7775887bedbca627e6d1_JaffaCakes118.html
-
Size
56KB
-
MD5
8d4c705ddf8c7775887bedbca627e6d1
-
SHA1
69c0b10e7f74069e4755c170f6e906bce465b2a1
-
SHA256
93020eb90912dbc3846d637a7ec36579d0ce7993a822689b9a981ff5b495e4ec
-
SHA512
96f83ca548ee26d412eb13365e616df7cf981f2e679d2061e27442de496b06fedf630225a4d6cbed7cebf97449c3a701e0ca3bf233d0c6c952db7e07626891dc
-
SSDEEP
1536:gQZBCCOdx0IxCJY4afAfJfPfZfrf3fufLfJflf6fcfKf0fkfkfVfvfcfJfDfunfE:gk2v0IxFIBHxjvGzB9y0Sssc9nExLmns
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 1344 msedge.exe 1344 msedge.exe 1892 identity_helper.exe 1892 identity_helper.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3384 1344 msedge.exe 86 PID 1344 wrote to memory of 3384 1344 msedge.exe 86 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 720 1344 msedge.exe 87 PID 1344 wrote to memory of 2604 1344 msedge.exe 88 PID 1344 wrote to memory of 2604 1344 msedge.exe 88 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89 PID 1344 wrote to memory of 964 1344 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d4c705ddf8c7775887bedbca627e6d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7d4a46f8,0x7ffe7d4a4708,0x7ffe7d4a47182⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15207112832519022528,5279882078548884132,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
504B
MD5d99a146c12ff48fed06f55a306ebccc9
SHA1fb84187208730d3ac2f60f872b02f6c7bd450de2
SHA2566ce15474e805a0fec345453f10cf751ffe7710eb16c81674c1ebf5d333ddeec2
SHA512d629273641eb02ad52a3bb0762493ba2f39afebabe759774ea7f5ccacb648af7ea3c9186467696954cd1850429b2997d24a44bbcaad1875ee2ad1242c26634e8
-
Filesize
1KB
MD56ef31cfffa5172945ed46d66e40fec3e
SHA1d424bdfe27583dd207708c422f1dd542caa2247f
SHA2567169ae3d0a452f37f32c84d6c924b8113fc2c958f65c543492f256ac733d0d64
SHA512da7423ce8af0f7bb60a3d5a23b93d43d8ca4e27a6608854f225c80526d8596e25bf4b6631206666d2219e43bfc381423ba9b660cefa2b094740c74cd396f6edc
-
Filesize
6KB
MD51536678d35544efca3eceec21cfa1101
SHA19732f794374ccf758ea120cf70a297a4e68bab91
SHA25673758fbf63c52b579ebae561c4451acb8e3f197a93ef08a1be5e9307e88f43cf
SHA5120782c40cd2482069a8b78fad0c61551d431ba099f2b02a8f621134ae190ee7230353a79f1df2d056e0b5d60c77f7fa1130b97023a51aeb311b36f426b5fb3033
-
Filesize
6KB
MD5d692ae8c3f19c17275c6b4f481df6819
SHA1da7c29801cad257df330922af31ea64381347dbb
SHA2565d05c6d0de869f4eb4d4c794e032382103557da3e50bddb0ca28d90c1c7932a1
SHA5126e9910b9461e64f931c3727338ff942987692524166228db5cfbbb711fac28f6ada671286e795db468c2c670fe480045cbdf0a78e2058fe43ebc3c0e17c7534c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e72ad1b9995d1c72acb76e8209c2465f
SHA175128e57b142bd2aa90e5058aaec9516423e18e4
SHA256a7c862d1eda77ddc27a9d84c17f893f4b7d8326d76017c98e98e8e95fe305348
SHA5120148cd0434e50afbd7fd4b9a53bd38df75f2f7f58309d52d1a6fd7a5b38fe932600082e0c6fa73bb703cb07c708888826e84d02bd9a72d46b1b3b4d80918136e