Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
a8c7a431aa8b53833bc770a70272e79f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8c7a431aa8b53833bc770a70272e79f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8c7a431aa8b53833bc770a70272e79f_JaffaCakes118.html
-
Size
33KB
-
MD5
a8c7a431aa8b53833bc770a70272e79f
-
SHA1
2e185fddfd3f90f744f0878a6cbc42fc4c70f896
-
SHA256
0c1e4923ffb6a3dcf281641c7b7a74abcd675d84a0d81ad7615cb39e3f6a298d
-
SHA512
28742757656aaa5f8bf8067154ee92371291849fcad32cb7dbb12e4cf983b176748b986758597d7a96c6502e978ad8704ea924c8445ec6f60720f48d3d022a8c
-
SSDEEP
192:PpPT1o5nZvnQjLnLkipPnQieFn08nQOkrnC0YnQTbnRnQUhEFwqIwqKwqrwqewqp:RymkiZDhY0JXV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 1032 msedge.exe 1032 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 5088 1032 msedge.exe 84 PID 1032 wrote to memory of 5088 1032 msedge.exe 84 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 2124 1032 msedge.exe 85 PID 1032 wrote to memory of 4300 1032 msedge.exe 86 PID 1032 wrote to memory of 4300 1032 msedge.exe 86 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87 PID 1032 wrote to memory of 2668 1032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8c7a431aa8b53833bc770a70272e79f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa198346f8,0x7ffa19834708,0x7ffa198347182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6924456430802582981,14197621331318854128,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
181B
MD5d1a71e179944ef346885f3d044470b17
SHA13e6f911d49540c8fd72b2e180fb0c55b64e6e7d4
SHA256dca1aac36e253cd3e1e1b78e68948aa93d22584e711105b4c8f1fab47f59b180
SHA5124f6ee58f5e7caebed4c92556518c61a55a06b1dd350f389505b34882df116e79fe921e58d3b9f580b01aa5493e96d9cb25fa7772f0aa4a82d0342773cb8df918
-
Filesize
5KB
MD5f10c3fcc1b364b044e0efec7071fdcc8
SHA1f173c8f40cde1457b8865ed66bc39298ac4638b3
SHA256859a9124eb98617f8e215deb3bd1650ca123e4d8d22afb60017751499bab7049
SHA5126272787cdc6f6ebd8f56ad5cefc85e2717ba6f4b346e96ba5d75689f5ab158dc7b70643db3dfcf0377308cc0cbcac435c287c330adb26a200dc530aed95971ca
-
Filesize
6KB
MD59924bcd2e510cac3936316260e3f1208
SHA1e23165ddcbf6672714ecb24ad29b0b149af9daa0
SHA25653d6615c1acbd7e4b8b31ec34743d53bfd6f8bea4148fa6faeb379b78a9e9c44
SHA512f7b721ba7d4f16328c468f8812cfc823e51248445a45a28ddf3f801d14d9fd0384263911b7efc07894274461936830158ed4816cc068065a4695250bf027fcc2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50990aea37c89791af5e5a3569d9ac80b
SHA1697e4017902ed532de3b5082c1f4a0e3b86a3eb2
SHA256b66cde40eda30c46228f4792a5df087f4d3e033baac228d7d4b8867f8d67f410
SHA51272dde314c6c3b0281afee56c988c68e1e9c138501bf3e90e14b783e8e3e057c854be907eacc48004bb6fe472eefbac12b47131701a177bc8e5e86a89f8053f51