Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
e7a0b877b4a7433ee32e7e5f7d1a3f16_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e7a0b877b4a7433ee32e7e5f7d1a3f16_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e7a0b877b4a7433ee32e7e5f7d1a3f16_JaffaCakes118.html
-
Size
61KB
-
MD5
e7a0b877b4a7433ee32e7e5f7d1a3f16
-
SHA1
87d3eb4ecc83a2a0395cad82784da3157f233573
-
SHA256
c135d5bcbbfc04cf82dbeb9acdcbadb07e97eaace981e580cfc42d95dc095a66
-
SHA512
a9d215af4f33a14940cf6423413f0b2c23f18f7ffa15adb23f07c3eec9a80dcae4a3ed900c0cb3f89c7a114faa11da36a292e2a5301ee4db6b0a8ee5b3dbff90
-
SSDEEP
1536:LIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZjNs:ajNRbZooS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 4672 msedge.exe 4672 msedge.exe 4692 identity_helper.exe 4692 identity_helper.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1356 4672 msedge.exe 85 PID 4672 wrote to memory of 1356 4672 msedge.exe 85 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 3704 4672 msedge.exe 86 PID 4672 wrote to memory of 1184 4672 msedge.exe 87 PID 4672 wrote to memory of 1184 4672 msedge.exe 87 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88 PID 4672 wrote to memory of 4832 4672 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e7a0b877b4a7433ee32e7e5f7d1a3f16_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec85f46f8,0x7ffec85f4708,0x7ffec85f47182⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17105475083911001107,8454248916357239643,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
308B
MD54e27a4d8fae0749c574597801ed05d0f
SHA1df07b26c20a506d0e140ecc741650d3d04e58c80
SHA25615166ffb2fd8c44eb7d194c4a6f6b70d8ca9e1e8c490075b3b97dc6281fb04a8
SHA5120f71fd22d916cd86ea7528d332dbe627c1b2bb5832c0126a65e0ed0a827d18039a2fcd8791419016888f701673ea4a6e0e4ce79e7bcb39d1ae3592535bd60e41
-
Filesize
6KB
MD54594671f2f0f4759650d21830b8221cd
SHA1a019af5472eaca7677a0344ed444f4aef4b78bc6
SHA256f90c605f8b9c7242f602606e69049feee9787b30357c71584fb4972b0915575b
SHA512972599a2e3ffb8f7c4a04d629cefee7115e17ad5c20ef38288e67239e242b18c657110079c7918d37023b416c4f49b4646131adf9fd38b57729b4eb5dbf28439
-
Filesize
6KB
MD5d94010521cefd1bc9159381f054d7edc
SHA172b93e62a30bc4f3da04b3c9693d978160d9ebee
SHA25679ffee56b74f0e33c517a526a7a748b110a10a6783661310b1e42a0d6f4bcc97
SHA512ba2251c08d24232d06e8df6d348cdfa74e5a857053e73449e3afb8b6f3a25b670dba3071e0ca67b750440788a30c8c7186fd3e18ff9c3e235732cfc7dc55ada4
-
Filesize
6KB
MD5f6c20724bb6a0ee3b34fdae1e576afab
SHA1bb6087d58e31ab510f55741606596392f2c7e191
SHA256e996386b817ee85a98810556f7de257f4214299f73fe75bed3acffc5c3101d52
SHA512f075d086d7ab3b888562436a84c26ec8715bd0e0b78acd3e449f95e180cf16dba826b9f5d33d884e4b5b5ced0b8c3dbfd7654d2e2dbf1eb8c35251ab0a2a8556
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54597e6256491ba29baa44f5b9f9845b9
SHA18d5cc7827da76fe5f366f76a2538acf6ff23b019
SHA25627d382ba8796ba908664bc32d25b67b1b58e20b7f60c7e7ba615ce7c75ce39fe
SHA5125fbe5d704e4b534ab0ad28c0c270961ea907a9919ad30da87940b49f8fa8e4c3f008f086b5181b0a7379a3ac6569ad8d0367b5288fd029494a03a4add5a0abac