Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
e7f0f8e53a7512d42b5cf5b3ea79a711_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7f0f8e53a7512d42b5cf5b3ea79a711_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e7f0f8e53a7512d42b5cf5b3ea79a711_JaffaCakes118.html
-
Size
2KB
-
MD5
e7f0f8e53a7512d42b5cf5b3ea79a711
-
SHA1
34860300228155cb95eda4dc343aebb5e09826ae
-
SHA256
92029d3aa0d93a8ed01398e54677a8688649f9ef3ce9371474d764d92a7d37ba
-
SHA512
2efeb7f5bbb367a786d5b2825eb6cfadea668e84c954e4b4cb87cbdb629d631a00c57931c3746c0217345d1c301c17515ce487a478e231515db7476286b7e630
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4084 msedge.exe 4084 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 1908 4084 msedge.exe 85 PID 4084 wrote to memory of 1908 4084 msedge.exe 85 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 2540 4084 msedge.exe 86 PID 4084 wrote to memory of 4908 4084 msedge.exe 87 PID 4084 wrote to memory of 4908 4084 msedge.exe 87 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88 PID 4084 wrote to memory of 1772 4084 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e7f0f8e53a7512d42b5cf5b3ea79a711_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd78c46f8,0x7ffcd78c4708,0x7ffcd78c47182⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15523071211523142623,15497624350391475891,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD5ba6ad33ac5683c53c2026479e6cde49d
SHA1a52b34ab75370395376ca803368775526691d324
SHA256b89369dc62721522c3f39e7d55042b73085c87c9e2ff675f228de5b5e1384593
SHA51292d9ea1a25cd98c738e8c8cecbd33880d5058bbcdf73fb1d29b4946f9b5bf83888da2200ce823f6efa24f9134b911054d8f77a56e62b82460c7b1726db3b0bfc
-
Filesize
6KB
MD51dd32a8f81d6083e1da91858db4b599a
SHA1c60ec7ad5de986602a2bb7f34b9b3355ba291b5b
SHA2569b4a42c6533fce98dab7a8f69ee9082a538d75bba992d0615c710c8aadd2671d
SHA5128fd87362d4d3e2033ac6779ec353988099b5ce724b31544e8daeb391a64ce7aad87d48a09c891cfd6737969ad53676fc2dc1c55ad7837da71d3df6685984d228
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5800ebcdaedd110d7453aa42b425cb1d4
SHA1f0115c7983fcc25b8fd13a810d40f96b2f6f3918
SHA256640161fb172788512d963e401c4b144a121816d4f4be4d8b95fc8d703c0218ff
SHA512064471065f6abc2b6dd5947a7e337eb5ab751b7a21955588f60e028f2021c53810901bda0bd1354c049cc85aac758412a5c9d441b5d0e06b9809b808607defee