Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html
-
Size
4KB
-
MD5
7143f4f0d7c9f3f4c661334988a66a28
-
SHA1
c6a3af81dfb9cc3b098a16435a55a9a91ae7446c
-
SHA256
cdfda66cb086766c6099236409a6e910d4fdfdec39b218094656f110a363deb4
-
SHA512
11b926a3f718bd8304c2ebd29f37a9661707438b27acd71fad836ea3fd51dcafdd872d8edd6572eea331487d54f64a80149e72f0f4b509e5d2cf1eae572c4056
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oywgXTlf:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4524 msedge.exe 4524 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2372 4524 msedge.exe 83 PID 4524 wrote to memory of 2372 4524 msedge.exe 83 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 3324 4524 msedge.exe 84 PID 4524 wrote to memory of 4460 4524 msedge.exe 85 PID 4524 wrote to memory of 4460 4524 msedge.exe 85 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86 PID 4524 wrote to memory of 4700 4524 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaf3846f8,0x7ffbaf384708,0x7ffbaf3847182⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15481563858247587220,655944433171323176,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2500 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
292B
MD5e28e60c178e92d53fb49791cff4da4d1
SHA1017344acf813b63045c637e3b3ea02237a83316e
SHA2569fc16943b2f68151fe87460f3f58cbd4f80c6080303cf9e695d34e678da1e6bb
SHA51257352112441db0140bdd610f69a111711af64073a25e63d7b5cbbc7c9dba2b40fddc2b8653a02866075c95e225e5cf130787da0522b0c916c233fb63be67aa8f
-
Filesize
5KB
MD5d1a560b4144aa56fba06ceaf1b8c16e8
SHA177615513c5221298677c21f7f377cac56927ab8b
SHA2562ee909440764f8524d81fe8c14684cf154429ebf723564c5ed49af6a7e1b5c94
SHA5125ed2429676975b13db5b1518efede508d5c09c9efa4a436e4c7c141fee907223690b9a509f27fd6ed860a87cc4b2626c244faf1a2d7682037791bec8bedf08c2
-
Filesize
6KB
MD523f4307ebb3dbf079b8f8cf87641b858
SHA1c5ca0dc211b2503876bed397e530b0020d33dbec
SHA256219040e40874d79a9e14916d81742649c57d19048c69e34cd70c442e293423dd
SHA512b86910db5a12f0a2c44448a6ddf317f12f4936efc9f5894ef071db8e248106696da7e5cd5596f16474311e2f0f198c1f779f0582b855b46baad1b25197c8c316
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c5247261d4436e9b3d62b11b4b6ec707
SHA1e2c1fda1d85a29e65e6ad5390741885ae26ce72f
SHA25622409ee091414b3c8d2cf93008a1d92ef13b6cfd6eca9cd6f886d99ceca4b416
SHA512b37a4f30db22fe3ca0411f3405faa1ef47de76f0dc4ee71269a4bcbe4ca8356e56e934b447c5b72bf5476312493d605cf182146ed2691924eb43012d075dccdb