Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
0a7fe5b18339f0d45e750e3daf07e8f9_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0a7fe5b18339f0d45e750e3daf07e8f9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a7fe5b18339f0d45e750e3daf07e8f9_JaffaCakes118.html
-
Size
116KB
-
MD5
0a7fe5b18339f0d45e750e3daf07e8f9
-
SHA1
40c55c00707652c3b76b286ade85d3e049ee37ae
-
SHA256
c73b2e72d6e7d093296b90f0ea80472a8b5b84cb3e6437e40e98e820dd81e1e2
-
SHA512
75b65c983aa81cd4f15abf7e65c58c71be253fae9d930a37717feaa526b4fe975c2e1ffb58724ff332748cf95f082cdc242aa77aea3498dc275b5a95c50ef675
-
SSDEEP
1536:+BhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:qhyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 3328 msedge.exe 3328 msedge.exe 3512 identity_helper.exe 3512 identity_helper.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 1300 3328 msedge.exe 84 PID 3328 wrote to memory of 1300 3328 msedge.exe 84 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 1364 3328 msedge.exe 85 PID 3328 wrote to memory of 4800 3328 msedge.exe 86 PID 3328 wrote to memory of 4800 3328 msedge.exe 86 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87 PID 3328 wrote to memory of 4432 3328 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a7fe5b18339f0d45e750e3daf07e8f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecdd946f8,0x7ffecdd94708,0x7ffecdd947182⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,9860750618070459830,8184234562502028972,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD52e3e62f76314cd4846a746c7977737a2
SHA1120c095b8cfffaf62a109cf388095205f2e03b31
SHA25624735e66ee8f5eb338c444c854498a4063a70699cdc5043c6d3f59334962d204
SHA5128b779d8d4e998f218c6d1b4eb21fe4885d4822c7e9cc6eb09e8d771b32784a37275886edeabc63a9a42cb048d7bdef14f50d9d8b032d268d7f8cdb79ccf7611e
-
Filesize
6KB
MD570fbc561e1b9afa188b3cc7205a96e59
SHA1d080f4459db3a319090f49f1c1fd832bea5e6dfc
SHA256d0351d5ca70189d714c2f2ebc491b6ced3971e06e68a7e9dbf58f70cf0d6f0a6
SHA512cb11731e23bf4e2a84201e1a7eae8e55d80eb67945856a5546652c672268629cafd25196902a3aadc3da1697181e649ab97bc7730f931af4ad1655ba003e7faa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD535763fee146ac1b16629840d84473a47
SHA1f55db131dc8b093d75dc5767111c8f39cd283ee3
SHA256b91b5af93b2c15ed8c76187316e6edb3adba859d716259951692c6ebf9883059
SHA5125fcdd2088a78fe76bfa042a4c709becdd803656f998f01824632d4a86adf16bcf9c4f3bed43ddd908171bbe4654d0c12ee9594e02f6eb314c36f274e0fbe4c40