Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
7289f4133276f0f975a3826f1c1e3590_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7289f4133276f0f975a3826f1c1e3590_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7289f4133276f0f975a3826f1c1e3590_JaffaCakes118.html
-
Size
25KB
-
MD5
7289f4133276f0f975a3826f1c1e3590
-
SHA1
3a3a63c5cba977fb818cdd9c82cbeddde1ae73ab
-
SHA256
4f8106600a97bfa6e04aa7b1bb0fbeb92b4c3e14f92fe39b19475d9b7b4948aa
-
SHA512
f3ba2a53235c43c5a114d7ebbe77e98853e334b98859df83d42d7f07b6a40dc3a9313cd92bcce1e044be835a3eb15dadc2e39e7c7f208abb8a3e4209db79f3dd
-
SSDEEP
768:0nnZ/o9DuLtY+cfQVmkcWuEiFxmg+Z1oP:qnIEiFxmg+Zo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 4036 msedge.exe 4036 msedge.exe 2464 identity_helper.exe 2464 identity_helper.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1784 4036 msedge.exe 85 PID 4036 wrote to memory of 1784 4036 msedge.exe 85 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 8 4036 msedge.exe 86 PID 4036 wrote to memory of 1388 4036 msedge.exe 87 PID 4036 wrote to memory of 1388 4036 msedge.exe 87 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88 PID 4036 wrote to memory of 3224 4036 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7289f4133276f0f975a3826f1c1e3590_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3e46f8,0x7ffe5a3e4708,0x7ffe5a3e47182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17426339110904427094,18349184718984563199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
499B
MD5d5457127c6e5d046172916da59e0ad82
SHA195ce3e3259273887f16b2277631acdedf397b907
SHA2567249fddbfa8fbd703ceb528c3ea6aadc0aa252b83732f288f3a633e2e831a8e4
SHA51272b0b2c18cd0d98152d5b002d882754c3ee39f41399a496e45db622f0a2a3b9e5bab3b53e512cfd28ea38ee45016301554c3fde53361d5b51bb9b74172291aeb
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5401b87abd4ae89405c3b383099c6f728
SHA1d324992bde4b62267ed9290c0e4de9dd769edfec
SHA256c9e4600187c60fc5aca0feca5cf413d0140779107fbb48bb8b207f2a905ceba6
SHA5127f0d02e09e0929a9496b563ab681648f048e08d41491dd6495a5f60324408b794f1f3381ec3bb5e6a5c8f45430659afef1f9de33e41c395704eedb42473fbb1e
-
Filesize
6KB
MD5c61f5e4109920edd92a67c009cb99a67
SHA10d44185b0f5666d56b60e08f91d2a85e46d87feb
SHA256428e4dd3ec7b8ba0c69f65b61a87f00c46be652ff0c45b72b25de480533edc0e
SHA51223d0b424afd5e6641f520ef1b099afe5714b158e99ce69671bb970580b017cd2e090bf62c8e28e83ef5234927202df312d397f07c689a85795e6758c959bf11c
-
Filesize
6KB
MD5f7bac0b9983daec0c4c59b5462e117f7
SHA15edf42cdd8a17d5233cd6be266afd4dec937b4a9
SHA25668fec5476597f6cca887fc15aa4e7a0b61deb8d89508ae7cfe4fc78ac1aeceb1
SHA5122619441550c0e997a2403df581b0ab7da2d8843cac85588ae34a374e7c8715102a99e5cfb955d5a4dd53bb169276c89234a573e767001fe1c6dd48c55fbcc219
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de624651c3704426da349bb71c0e1534
SHA1d78edc043c3a6d48b70161290377a1e6c4270e98
SHA2563c165fe3ead91d43ebbb44bf25ab7dd724dce72ee945b113d1cb95ca68fdd417
SHA512cf3288f321e87b95edd779a264e425fe17be70d870cd3ff21b4e837e0b63b92137f7f8de62df7badab137fed0765cca281a73cb727b5f9a3534446361fa6d1ec