Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
b8d0f7b37b86915bcef0b7ea9dfb9a53_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8d0f7b37b86915bcef0b7ea9dfb9a53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b8d0f7b37b86915bcef0b7ea9dfb9a53_JaffaCakes118.html
-
Size
37KB
-
MD5
b8d0f7b37b86915bcef0b7ea9dfb9a53
-
SHA1
c81eb337716d50598627007121b1e88008355ff5
-
SHA256
d0c3fd6523c1f76cff22e21650eff31751b5acb1d122cdba85e87cbdacddfb21
-
SHA512
2ada48e9be7706e75cdcb7d64e59d963279f7f124e2c5d22eed0c09231da2051b224cd3f706b3f5909c57e9f90c71827a559d7e85a5b122377ba47572bab2906
-
SSDEEP
768:53iVhA2lj9iC3J51AGcQO4ekTvsLBG2tA5MRX0fDCg548gpA9dGabROIine7jkQq:5AA2ljAkJ5u1kTuPMT92L8X8QRRf6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 1912 msedge.exe 1912 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 3804 msedge.exe 3804 msedge.exe 3804 msedge.exe 3804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 836 1912 msedge.exe 84 PID 1912 wrote to memory of 836 1912 msedge.exe 84 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 4000 1912 msedge.exe 86 PID 1912 wrote to memory of 4000 1912 msedge.exe 86 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87 PID 1912 wrote to memory of 3416 1912 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b8d0f7b37b86915bcef0b7ea9dfb9a53_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1c1646f8,0x7ffe1c164708,0x7ffe1c1647182⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11388132081269877483,11276035267018035698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD558090cd50b5f1f39ca9c565dd6ad7005
SHA1a1e1558afee8017b3d2fd7215b40fca1d845efac
SHA256be798bffb90167bc2200378679038f97fa93e479c83e6d55bcf29f32a301eb9c
SHA512d54400b8568eb6d1642efec9be7377b05b97d35ffe056b81ea8be97aaeb928f3e230e3ad364c207d6f0689c378262ad99ccfb97e41be2ea72ff266c63bcb1a68
-
Filesize
5KB
MD56f55cd25cfbf64f40de873bde44f08e9
SHA1be254ebdc463f0205aeb9e5e0e28f93f847b3ebd
SHA256442bb3b6a6d925caa7b4a8976b4beaa3789c5ccf027ba0960aecd4d8b4d1eb1d
SHA51247ec96d78ab4f0dc517501f063ca014aa43fc106c037161894c5bdd6c0164505ae2b9d6be76e91daa14fa6c204128479ab28dce1391b49d22e747a00aadc71be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD562fbc4eef9e4fc6ec5879bdf7611428b
SHA18b1b1b8b82834b854d3c5f4c905abd4ae929b317
SHA256bc2a351cfa2406368ed732defa1474cd62b56ded030a228862e2fe1ed6b78bab
SHA5127c0072ec978d6a9bb03a417f5f67fa6615e1b1c3db90b6cfad93d28df28e46ffdf085e741d0306697c8c13fc3c2490fab0128c1acf032201d6ba84a6b8ea5a24