Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
fd7e556042297234094c55232dd6a573_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd7e556042297234094c55232dd6a573_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fd7e556042297234094c55232dd6a573_JaffaCakes118.html
-
Size
601B
-
MD5
fd7e556042297234094c55232dd6a573
-
SHA1
377d6971857e7022090bad91119eb2d0f0cc5786
-
SHA256
79705f354f66fa870e5af7569680d19067d81b6009477164a13794cdbd992b88
-
SHA512
717ef99c0a81c1bbdcb1a6181455a48ecc7fba6c83d7d721c183a93b59463ba1f925e528db11467746b76b76f124fe65115c5a14dee589acee3dfb825ca8fa07
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 1356 msedge.exe 1356 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 5820 msedge.exe 5820 msedge.exe 5820 msedge.exe 5820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1860 1356 msedge.exe 87 PID 1356 wrote to memory of 1860 1356 msedge.exe 87 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 1964 1356 msedge.exe 88 PID 1356 wrote to memory of 4676 1356 msedge.exe 89 PID 1356 wrote to memory of 4676 1356 msedge.exe 89 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90 PID 1356 wrote to memory of 1716 1356 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd7e556042297234094c55232dd6a573_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe8b746f8,0x7ffbe8b74708,0x7ffbe8b747182⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,9377522045465335135,15907223820675573723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
6KB
MD56718bcb7141cfb1df30ed8423636d9fa
SHA1192f1522032346efa0df9c41ff1360e273af8964
SHA256f00578752d975f369b740cfc85df481198e61ee71fbb6fa7c5ed378ac4f9f159
SHA512abe20d36070caa98d8a75c37074bd1d84c24aed7bb99909cd1b6f1b1effa49bc57136c076b808a9dacfa64f62111600b293c194a076b77249276caf67c6e137a
-
Filesize
6KB
MD576ce8787d79238df6d31b097dcc5c77a
SHA1d97f8b4bbdb5a71c06f6664f4d6d4262c933a850
SHA25621772118083011d99af931801e5a83ec0bb7be2e71c29e5f8a595b2a92f48de9
SHA5127f21b168ab82911c1fa2dfd63998b3f8f4472e94dfceb9acfe1435aa2faf89916278a0528fe57bac3556c835c1a0360f7b2d983f953c0cc2dd17c518a4a0132e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58cfcf01da1efa57f538222f81b5c30ea
SHA12a8dd15523c87f276707930dc737071bcef670f1
SHA256dcc805ddbfdc866eb22504c592d6fb8767ba6ca3ecb1aacf21b71bc4c66b2b15
SHA512d677370685265baa9df12e62d6ac745533e11e48140e144a141e6f22614fe84f9dce1d20802b9b07ee78b93e8ee43b094170d8f54b4bdbb5ee39b66205c9db3c