Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
26f25f92e351030e7d3dbdad8ed55f85_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26f25f92e351030e7d3dbdad8ed55f85_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
26f25f92e351030e7d3dbdad8ed55f85_JaffaCakes118.html
-
Size
14KB
-
MD5
26f25f92e351030e7d3dbdad8ed55f85
-
SHA1
4f349297ff1fcc058dfdb182cfb7719c756db737
-
SHA256
d3ff13db7e3e219d8035581926ab1918410d357c20ab0f6a4d319e80b5ecf5e3
-
SHA512
a00a5676ce3b05a68dcd923baa188c860b4551bff256c38cbcb2e9d3aec4fc3d60ba02fed0b0194a3550ae5b617be961439d1990115f725ca4f89182a11f17db
-
SSDEEP
192:uODOf4O26WJH5mQlhwOAmKmYmC8mHmUfh28Zd8hlOSeU:Tqf4O26WJH5zuemY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 2916 msedge.exe 2916 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3012 2916 msedge.exe 85 PID 2916 wrote to memory of 3012 2916 msedge.exe 85 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4588 2916 msedge.exe 86 PID 2916 wrote to memory of 4992 2916 msedge.exe 87 PID 2916 wrote to memory of 4992 2916 msedge.exe 87 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88 PID 2916 wrote to memory of 4484 2916 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26f25f92e351030e7d3dbdad8ed55f85_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb191b46f8,0x7ffb191b4708,0x7ffb191b47182⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5724437148798430889,4143874733761617834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
6KB
MD5dbdeee74970d984f7f094d8069cab066
SHA1a3ed37e3f57e1a16b24a471962243a14c325461a
SHA256ac52aa7a87b44e6911ede7b01690a206d64325d8d297bca438438fb15ae4674f
SHA512ec273e9703ac48ef64536d207fff99fed655ccf5ba454ab4b8f4a70ec032f55f98f0e7a4e088fcdc3fcd6101d78089781d5c95a2ee33bbc48d00da44418a365a
-
Filesize
6KB
MD55999158c7134da5189ca9170f4190427
SHA13d65a0ba32625a269f16ba56507616e6020a64e7
SHA25697311a038af6cd34703e206ea6eb8654b3e88c83de12fbb1a7b24912c56dff3d
SHA5123777cf80ff8a3d501bb2a8934a2322361adaf889d7c1d9fc8071f56e305cfe6459e2c9499e3558fb4f1776ec828f1e497d564902e8ba15eb952307fe62470b72
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5efd8c5221808134d043c5d100203428c
SHA194716f1161ec2eda9871b526360a97e5338f9dcd
SHA2565a33efcc1c3afab6235211182c0d4682a7419fb5b825a72faa6c83f267c035bd
SHA512860d4bc1955607dfb3fe66f55cb575d8cf95e516fe0ad4eff15fced37f1e83334e0b2cd07e2aa5cea7270e1d7c713e5ea574b58cdb09a45cfc0fbd947736163b