Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
7194aaaac1a1afec6ac63dcfd6d4cf98_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7194aaaac1a1afec6ac63dcfd6d4cf98_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7194aaaac1a1afec6ac63dcfd6d4cf98_JaffaCakes118.html
-
Size
152KB
-
MD5
7194aaaac1a1afec6ac63dcfd6d4cf98
-
SHA1
c7ee6c62b0cb66da69b4e357cb1327b2c948c270
-
SHA256
b5da9b14b5d7a2337bdc511ed28419bb69ce089c29f389dd4a926e881ef8fc14
-
SHA512
6fd6d2dbef0a951895c65653fc547bc20d02074c1db34fd89777ab80eb283d8a3965d41baf024faca11b8157cea55fb94c6ac586df9dcbd088b0a4b12bedf1e8
-
SSDEEP
3072:dftzy4whwj/zUiLtvEpBfzegaMgxx1vevq9yxcx68QFdUjajbr8p+NxR5ZkZaSIA:Ntxvevq9yxcx68QFdUjajbr8p+NxR5Zs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3036 msedge.exe 3036 msedge.exe 736 msedge.exe 736 msedge.exe 928 identity_helper.exe 928 identity_helper.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 448 736 msedge.exe 82 PID 736 wrote to memory of 448 736 msedge.exe 82 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 83 PID 736 wrote to memory of 3036 736 msedge.exe 84 PID 736 wrote to memory of 3036 736 msedge.exe 84 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85 PID 736 wrote to memory of 4988 736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7194aaaac1a1afec6ac63dcfd6d4cf98_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc53246f8,0x7ffcc5324708,0x7ffcc53247182⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3478084516294346347,7306250517469841925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
1KB
MD58927890a9e3459ec1681a7eed170a2f0
SHA1b6b0a3b65d2d0ec661da1e22083e8663527ee796
SHA256bfa929eeca932e395f77924d1daa6dcfe162aa312b18f402a4bc679f2947c675
SHA512d69b9e680d52b8f28018ec950c0a9972b62ae6b78c12d19748daf5929f55f4feb792c376f80464545a1cfcd73a49ff4e4050dde3177989309c020608d016d5ca
-
Filesize
5KB
MD558894212e6afbef6e1a9ff5cf42c174d
SHA1661cdab24372e50e9f413b2b98c33b2da442baf2
SHA2561cb3a1f8543f4e4be7dfd7e217523cd1a9faea44b001f15fe6ea12b22f0c3769
SHA512d21733c7a8d711db3bd367c12a985839ae279c7fc3ac2c3458c58b881f658bd7a742d703327790ce9c69328a0fa1d02292a4c88c960655613b0a645c325c04a1
-
Filesize
6KB
MD5e1352d491f0ad3b1cb693f282cfe6e5e
SHA1dd4f0bfd80eeda181ab0bef36e3d5639e649b6ef
SHA256403daee49a466b81a90abef8a0d0bd096d94fed5c599f8238f7c4aa2ca467794
SHA5125b73f6a4dc3f28ae201d19376f8798a8855faa401a5268bbea47718444346079c1e23941ace6c660320a3ed1966821684ac9cfcb499171ab887e7171b25715a6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eabc84ddcbc1a0562b4fcee66d074ee2
SHA1afca989fabbda13abdc3ecb7f8d41d5a221cb617
SHA256b39966c20f83c1eb855b72f129ab4a2bc9d589a75adc6b2e189be3dbee3ea14f
SHA5126477ebe6a9998756fd351949afc25b424fba3974620d1d6ea4be60db305678f5605db050948a27a53adee48b852312b21768340df053f2c986ae381dee45a044