Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
c8cba11bbf3d8d1f5944bafe4932c2e3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8cba11bbf3d8d1f5944bafe4932c2e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8cba11bbf3d8d1f5944bafe4932c2e3_JaffaCakes118.html
-
Size
19KB
-
MD5
c8cba11bbf3d8d1f5944bafe4932c2e3
-
SHA1
c3f17a07badfd5e91898d3d7fc64d4ff44e2a0c2
-
SHA256
afd783f84663670aee9262a55c3ebb1b22f7e4f852e2ce63d7f5b9f8b4249c9d
-
SHA512
89c020b0e49204ef6ca2b44b12d38380151c6e442d38643afd01c1cd62bb30a22e55cd2b19e48c3e7127181847744da11973c92f450c05c0b72a06f86559a714
-
SSDEEP
192:aRYak/aQZavzB/NjqHUbuwgOX8VOOEGD2mP4xCn5nMJOo1FHOyf9dd2bSmF4RE7c:+GNCV6Ub/pO9N5nMJO4Oyldd2b3G8An
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 3428 msedge.exe 3428 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3428 wrote to memory of 3504 3428 msedge.exe 84 PID 3428 wrote to memory of 3504 3428 msedge.exe 84 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 672 3428 msedge.exe 85 PID 3428 wrote to memory of 1804 3428 msedge.exe 86 PID 3428 wrote to memory of 1804 3428 msedge.exe 86 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87 PID 3428 wrote to memory of 4620 3428 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8cba11bbf3d8d1f5944bafe4932c2e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9addf46f8,0x7ff9addf4708,0x7ff9addf47182⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2860 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1308213336193739112,7504864734725133543,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5d72fd73ff1cc3ce28842ab0708ff7e94
SHA14924b32b6b8c0f8171942c00b7bbe0a90199a530
SHA2560423549688a59b107011e907b8bf00681e82b6d9f5c008a4d94d6645abcb0c4a
SHA5120d146b9ab7efcb1c2ec2af6e63f8f1591219f4c5af0b02994194bc9da46a1a745bd9e61838fddeea1bc540579eb31c97169b777997f46c10123ae30532bb8a45
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
928B
MD58ccfb3d7c5c2a61671b145512d797802
SHA10b9ddd003d5884cc1335273c5f32bdf8db39719c
SHA256e831b5eec979364a45a3087611fb8150a2e055e4c63ea99bd3bf1d335ecf55b3
SHA512b2b365e0acb043daba0c72cc1015a0563ad7788b2b4b76d5a7e685f90fcc4081e2e7d3af92893aa4bd0f08882facf4d81ac2bf23db2bae0e98bbf08c4ccc111c
-
Filesize
5KB
MD503ac5d6bdc4955c3bf65cc1dc068fb6b
SHA1beac2857028388b88ee29146c90a573aa5c4e3e0
SHA2566b88e576d50e79579fa7ee140ff443e0015cad380942b9729198b832c1c3a7c1
SHA5120fc8d02e34c4c859ca7f66820e4d4eed6469f9d5ddeb35f7f344b3033c3384e46071a8ea5bb1a9ebc6d934408336be02f25b1b3526a9c0b9c4bffa8bb7198bed
-
Filesize
6KB
MD53bd946cefe4c753233f66c929e5d9fd7
SHA1ab82375e08ed6825a4561ed8f3c99e98f088ee3a
SHA256849308775c8db0b2d7a6d4063309ec0a9f5c03af2f8730846d8a445ba21046c0
SHA5126fb0e37e96fd026b314b24c2fa996daba82ea18c6b68edef17cf2851b72d09a5ead0d8e58bc9ef5e1b9a459a855503c33f6ae0ac364df123ded1116be8e31059
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579640381c0ebb7266ea6a211d416381f
SHA1d4329847caf107937a301c42cf39e6662f18655e
SHA2560ab868a681b580de0e7401582cc8dfe3846c833e35c9fbc11b123527a5938d11
SHA5123f71bbacbad7e23decb5b9ff74f854d8f6d2b23c77e35f61649afe49386cbd638c8276395d90a3fda654bc53a0fbc29bf4fb989b77dd5c6ac0ce7d40e75c6bfa