Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
01c7fc1e4980ca504b0f4c645f9b42c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01c7fc1e4980ca504b0f4c645f9b42c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
01c7fc1e4980ca504b0f4c645f9b42c2_JaffaCakes118.html
-
Size
9KB
-
MD5
01c7fc1e4980ca504b0f4c645f9b42c2
-
SHA1
f6055b5a714c511295ded9fbce50217a94127b18
-
SHA256
6b7cebe60e497c631f43ac4270fc56e0d33a8faf00c121815e812b369ea5b27e
-
SHA512
d284485c3292f2e360ac938ebbbdd31d04e2563c38c906d991d4546a8549d43852060d524c54f8610e8f8bf70972b8ed017fc3666623cbd1a7b3c2a291f66d29
-
SSDEEP
192:SQKudPnsZGX5gSZY5Z0YBs092rsI24FB0SM67UWNZgHZvt2zKFztWz6zfzjFhBBo:SqFYBCg+uFrY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 1316 msedge.exe 1316 msedge.exe 2580 identity_helper.exe 2580 identity_helper.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4596 4312 msedge.exe 82 PID 4312 wrote to memory of 4596 4312 msedge.exe 82 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1376 4312 msedge.exe 84 PID 4312 wrote to memory of 1316 4312 msedge.exe 85 PID 4312 wrote to memory of 1316 4312 msedge.exe 85 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86 PID 4312 wrote to memory of 3252 4312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\01c7fc1e4980ca504b0f4c645f9b42c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa59d446f8,0x7ffa59d44708,0x7ffa59d447182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3092 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,2022281994414999091,3751813153882268393,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD56429cc5871afb7bd42b1f0c85b11de4c
SHA18c442e9503682a41a772cea2958d41f0efb47472
SHA256be763b2a06bbc48572e3a7af0585231cfbff3e7b32587f2de9ce9cf329395558
SHA512fb2275b6edf480ff6ae4b9f0310597b046b15d563f0d4ec10e888d4ffb81f0ea61f9671bfc54d40d651af96cfc029a12ce64ed36363f481a22952057825941e3
-
Filesize
6KB
MD552c2aad04e87e554df8f0a92c2140f94
SHA10265fe24a6811eda88de7f64b6bb968b60493942
SHA256377f51c9dcc9165aff8aa546ef9a96bf4b68c933785d142963a72da0d3e4f0d8
SHA51203ccfd7e17e91485523a3033c5f87448c7fd17b0bb203cc6cf55918559804cbf61b567db0efe34aa00815031d686332e5524a4bf3644a36ae2937dee6fb8f164
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50410ba432df6347f9a7386272c6463f0
SHA1b4777940c038a4a788ef1d3272d9b88fedc9f718
SHA2565de4fca45a0d279c7711831150922db9a37a0ee9fcf247d9d852382838a86c60
SHA5126dba11d774772a6e28c4ae22843d90259238011e2d93bf55321033e1bad868c3f41bd1c700c57687727d3d17ed0e4cc6bcbc75276d2c39c52e8cb2100bbbe65b