Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
07700a18daded891579c576f728dceee_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07700a18daded891579c576f728dceee_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07700a18daded891579c576f728dceee_JaffaCakes118.html
-
Size
57KB
-
MD5
07700a18daded891579c576f728dceee
-
SHA1
72744e96829a8d9443ef95ce93a0129f436f66b8
-
SHA256
6de9223755e83c72e4584b1febfc7ad07607ab5a6d1c8613d56d28829943cff2
-
SHA512
0a4e34cef56d6ad6471b2e37287222e73d87cf9fc58b348aadd6cf36b6b8aa70766dcc1234bf09e89a2df6433e950f0c3b858b4044d30b77e866303df0f87530
-
SSDEEP
1536:o2GVPMys/M2GUyDn5WTDj8MRQPEIemZo+Zz/j6Q2kt:gs/4EIemZo+Z7j6Q1t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 3220 msedge.exe 3220 msedge.exe 3576 identity_helper.exe 3576 identity_helper.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 2980 3220 msedge.exe 82 PID 3220 wrote to memory of 2980 3220 msedge.exe 82 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1812 3220 msedge.exe 84 PID 3220 wrote to memory of 1496 3220 msedge.exe 85 PID 3220 wrote to memory of 1496 3220 msedge.exe 85 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86 PID 3220 wrote to memory of 3340 3220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\07700a18daded891579c576f728dceee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb046546f8,0x7ffb04654708,0x7ffb046547182⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18387198297837621052,7399381731207060041,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
448B
MD5600ddc8ca9c2a06a990e79615498210a
SHA187afa5974e182f277745bc678c9ae65427ac9d9d
SHA256614ca421aa44fa9b390e4c50e93ed1ff95679ec1d8e06fada16f2bfa4edb117e
SHA51275acea2d2efa14e238c79565d40158fda05ba3e4e806d163604b75b14220b56406b3fbbe43bfffd958f135e4c2ab650930c6845df0ebb806463452a91eb6c9d7
-
Filesize
6KB
MD5ffaf4d313c25972f08eba2370f254496
SHA169e5dda3e6e05ecf95b18c45f887ca3e178e4743
SHA256eeaa9d9f8f30dee6c07210bb68df55cd8445f0f14aea12ed163e1404ceeebe93
SHA512b7bcf530ccb8f2b4cfa12105855ed89a98b7e108db84ccea218eb137d60fba25dae99aca7ff3b065aace1b4445ceddce16d2a7c3ea7fc4978b51a2d8c33983cf
-
Filesize
6KB
MD58954a8083e5e403361a2da7119ebc4db
SHA14a7eb3cf2a24e9f47a60ad4ec9fc32258fc5d118
SHA256db49195e95ab33f3a45ceaff903658fc37dbd23222213f0ee70754c3614f7291
SHA512c480257f699c3c2b984c36d406400f330b01863644b58776bfaf3b30e1a1de658fcb7f554386c870e61ba0a6e94ac877e3ab24344287a4ce2d00a7b36da033ca
-
Filesize
6KB
MD5ea94b316fa900f9572cf83678469e608
SHA1128fe39d5a96ae1681ab307ab0b80ef735c95640
SHA25660c8a7593c1d0ce72d33ab34c82f4ac8bbbba19b3d104c22d12e4eafdfce11ac
SHA512090be89be8ba4faaa84a46790a6126752c40c79476c37f74b273ebbf891a73f7ea37683d0d226b496afaf362ffa0589eb5a132fc53332e63de83eab9164959bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD570509489ccd26ad179ff4ee10cb61aa6
SHA120987f638aa33ddc891b07101f55c24a9c2b9698
SHA2564ee732df1db42745e62fe96a309a9d77015b12f4e6de2b368ee759a5117906fa
SHA51264ae075608ba67e10ed7f287fb2f652949055ab4d46beedde2589cfc44a6f59495728abd2dd5793389f08f8ba020553fd1a904e42375f04027484c68d4ce921e