Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
07966aa7325a2298f1761b4fa80059af_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
07966aa7325a2298f1761b4fa80059af_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07966aa7325a2298f1761b4fa80059af_JaffaCakes118.html
-
Size
3KB
-
MD5
07966aa7325a2298f1761b4fa80059af
-
SHA1
8a9194f090499b12a981174c35631b95bd8deda5
-
SHA256
6c6b2e1e9f755c1859320d2962e18b0cd6815562d43a34e67213b8fcb1336217
-
SHA512
b4ea925c8fc721d3a8f81b9132eb8d943ad1e0f9a91b7433e3e58e2bd8989feae7cf6f4c5befae7bbf82e28bf22ad08a0fcf306a4d2bacbb0df6d0a74547fb38
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 2636 msedge.exe 2636 msedge.exe 4548 identity_helper.exe 4548 identity_helper.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 888 2636 msedge.exe 84 PID 2636 wrote to memory of 888 2636 msedge.exe 84 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1832 2636 msedge.exe 85 PID 2636 wrote to memory of 1164 2636 msedge.exe 86 PID 2636 wrote to memory of 1164 2636 msedge.exe 86 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87 PID 2636 wrote to memory of 4004 2636 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\07966aa7325a2298f1761b4fa80059af_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca55546f8,0x7ffca5554708,0x7ffca55547182⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2580 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4708706075983080637,10886041853508764171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:12⤵PID:4780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
6KB
MD5c1aaac37b2d4a8ae5187b27a70f856cf
SHA146aad773e29331368a170f5087ecc3ba78146343
SHA25641a916d55b74f9886e5ae89e17b2b015210ed06d741e0ea3b3f3ac336cf4c099
SHA512a1253729e880cc4c9a4733f3fa02a69886cbcee5974afb473b5450e3a3d2c78c3cbeca835ed8571021794dfeb0467b21ffa5ee313875cdf85877d086c7a687f3
-
Filesize
6KB
MD5c4c178509cfdb6399a9da41e4f826a05
SHA1f3756fd4f0f2d7a75b8e6cce30e26406a2851778
SHA2569f47b798dded46dbadd5de4ed600ca4bbd4e8bd220943b2cbb73248add5d2631
SHA512c4b2073dfccaf3d0e112160159fbebe92c767bb30b631a1e8395144164ffc20237ec5ac954f20d0f223b05f22c10349d1dd8dd8034b102be98f59c75127907e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD542c0fb4a578d93475689d2fe21128867
SHA125a96e5f588ecb71b84d751ddd8277898af84f5a
SHA256eaa8b7f1d9fc983e52deb182e016c73f6d49a7303c71d59d4ddc752b956e7889
SHA512f0e58e05f8cdd977e1d86914cb1e228fb6a7f5cd1e8eb71f04a3a4bdacafcbe3b3da57863b4e141a992061e09646894791110bb20f7cdbe0b06fb5efef701d9a