Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
26725977d2b882a8087a5e9eb9dc3a53_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26725977d2b882a8087a5e9eb9dc3a53_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
26725977d2b882a8087a5e9eb9dc3a53_JaffaCakes118.html
-
Size
26KB
-
MD5
26725977d2b882a8087a5e9eb9dc3a53
-
SHA1
de6a61bddd80eb74e8417698e944a6f7a478ccfd
-
SHA256
db5a029488a97b0f272500d3e799bb9c8a97c50e65af0995ccfeecf95eff0545
-
SHA512
12c41cbc4c0ef564e0e9421de097216e76741330ad209d7efba8f0c40b50da54274c42b17d9a15551374a2c4c19b5706af524e60113f73a3bcdf9b706a5550c5
-
SSDEEP
384:xcs+Khq1vA/K0/ejdFU8iU45SVL/THblnvCEgETz4EDB3NSCShvrUrCwTc:Zh41N02Ro5wTTHbdvNk90Tc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1508 msedge.exe 1508 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 5116 1508 msedge.exe 79 PID 1508 wrote to memory of 5116 1508 msedge.exe 79 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1620 1508 msedge.exe 80 PID 1508 wrote to memory of 1704 1508 msedge.exe 81 PID 1508 wrote to memory of 1704 1508 msedge.exe 81 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82 PID 1508 wrote to memory of 4244 1508 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26725977d2b882a8087a5e9eb9dc3a53_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4d8e46f8,0x7ffc4d8e4708,0x7ffc4d8e47182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9845446570406453295,5922560042582787254,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
192B
MD5a81a27ab34aa42620a076a053a15db52
SHA182cc7251abbfd1490da3ab282beb4fcffe8f5ce6
SHA2564dabb6bdcb10a4fd864d280561d4c31bb18e60b967f6c44732017392a0120b47
SHA512be1ef7c1567763c65e397a39247916412b52d7312326e56770ba2b292756f4b8b62daf6c70467606a37a7a07de95e25d9cc6fe498ed48ba97de7c69c605b095b
-
Filesize
6KB
MD5c9910d827a13af138a887f010ab3080d
SHA1e024b28987ebc8e9fb393ee7373c8c3ded4c1612
SHA2566fb583f117133c81014bab5d9a21ce51f53ce7976f54479c751d25e55effb2bd
SHA512799e59d5b62a5ae2f1dbf281c9187035bc5ffedcb181310cd4804a221dc5963ff0f068bef310c3fdaf62cd7ae554c6018f67361836d7c0c238858d824bdb3d58
-
Filesize
6KB
MD512fbc73dac8f26d85b9ae41d1d134d9e
SHA1f56dbfc9582096abe3abb25959762f843b604854
SHA25649707ec9c52fba2ab332f474dca698f61fd42cb33bcbd0926f48063a4488b439
SHA51247e939e4e0a6990accf5d76b12363779eac48eff010862935cbb12bafc018bb3484a63bd42fa2b6a6c93b7fcdea373e4b9817a84bded92ddfe86015a19c063c1
-
Filesize
6KB
MD5e1550f00390c36f3db3ee85696ded873
SHA101ca26539ffe64d99c983511190c9caa8c0d8261
SHA256b99ead191ae64b5c393fac51aeef5737826fb40579ba4087147f2cabb1802faf
SHA5128bbc42195d3f4149eeda1c4ceece78f66eededd4682cdf16fb72a1d0612cd54f72e9adfc6dd3ce01ef355dd761a532f83893d2cfa106453d02d97396419c78a3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5de6e793c314997f04f3653aff6867c8c
SHA18bdd942968bfa0966b89e3ee159ae5f6324103a4
SHA256c88ee42da50fc18e9914f87c7dfa30c0ce37a4644639ce667e150979574fde3d
SHA51285f5dc58c611913bb056a32b3f94c7d1722e95d2abb641f298f2ed29364cef4daa3e1ba232737db657e814e899269ddf90142a4498f015f78f2db416da1ec6f3