Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
7724662cf12ba5a9070050723d9f65a3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7724662cf12ba5a9070050723d9f65a3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7724662cf12ba5a9070050723d9f65a3_JaffaCakes118.html
-
Size
100KB
-
MD5
7724662cf12ba5a9070050723d9f65a3
-
SHA1
d47cea273248cac345afe25fde30cf0009438dd3
-
SHA256
875464ed0456d5020a1f7a8297a9b3b836fdc6092d46d6b88839b03165a58bf9
-
SHA512
a137a42759060a7e45f22846e6538016d29116178c4aa2c057597fc107c2c38b6e348b66f4b160165c7f134ed8e787592fc7648d4a75e69f2efe192bac5f3d59
-
SSDEEP
3072:pIGAqU4ea5tRMHBXO0m/cSPAvSd/SwLDu2:v5tSqB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 5116 msedge.exe 5116 msedge.exe 1684 identity_helper.exe 1684 identity_helper.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2344 5116 msedge.exe 82 PID 5116 wrote to memory of 2344 5116 msedge.exe 82 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2416 5116 msedge.exe 83 PID 5116 wrote to memory of 2252 5116 msedge.exe 84 PID 5116 wrote to memory of 2252 5116 msedge.exe 84 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85 PID 5116 wrote to memory of 2316 5116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7724662cf12ba5a9070050723d9f65a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6fe746f8,0x7ffd6fe74708,0x7ffd6fe747182⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7202225896554152880,195767104975151852,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
244B
MD526a7092a8c82d123d52a742abb337a7d
SHA1a9993b6bca554efc4338b9661f787d22f5df42b4
SHA2566badd65e3a6af5d18beb8f58de5f1a3fde411e1ac2951c86100c678d8b777f24
SHA5123dc0706040538509977e5d06026f96b097d5752326423cf6603006438ab3e749ec05ce5a7a76b25a9b441bfa955f0631dc27069e31ae005411773afefbd41a50
-
Filesize
578B
MD55cec0153a854a5557a7421b04c702dc0
SHA14bea694f4f23de1c81bd09920fb9c46d63beb7dc
SHA256128e45afb130acaa3ac06edbeb12cea37402b0aacff76e9b77e57c73820d42dd
SHA512bf1d105f66d2bb03bb624141d08dc8742bd040375047d411632078eedbeab99cab83fb29b3d922f9434dc93f5fa2170815eb09a32cf9aefc7867a5e41d2efa0b
-
Filesize
6KB
MD59ec9bfc370c7f35dd374af2cbc56bb3f
SHA1157e75c21c1fa36162dcb8208bff2605040c571e
SHA256ffb8b94a163b119c75e8edeb3358a2b03f080c31f9567b56296518de14d620bb
SHA5128c9ca0d15002090149a71be57ef2d5851653270a468d36f27695099f96b7379672e1ececf92c7ac2360ab8a24c288e3ee17d3e376b4a242a01a804446ac2d6b9
-
Filesize
5KB
MD5bf3699eedc880ba5485e5b81aa7d426e
SHA1e8118fb7eab18e31b4a0a320ac10e9600a02d3c3
SHA25647f93fc1da2658b28344cee147db404a692af3aab8f866b17c1459cb3956d843
SHA512a707481e1a2d017eb180632f8d00ae180ff6d4acad8e42d743862ebbf40b3607d20e7f9abf5576f37bc678d1d0af0ec082532e78ed078b9d2b04cbeb9f1d59c2
-
Filesize
6KB
MD553497842312ba08c32c1e1b14c25982f
SHA1f3aec9e587cfffa0cc9dac4255818c96b6b614e3
SHA25643b1f0e42e0ce57aa8e6786b1c1892bde640841ffbd15ef515abdab10afc7dbb
SHA51206dbc2a1dd7649712fee9350169c3ec6bf75e115b85eaa7c490e132467b45c0c7b87e2f2613fa77b1bfe383627dd0f8cb3511ae8c0daaec9aef3ca28516be5a3
-
Filesize
6KB
MD560f153520d3bbfa108dbc73f64a22dcf
SHA1e7d5bd41428e7eeb7f6410ec4a1d4a17fff8fd87
SHA2565d997e3d3b33746e5f2f0570be7a63d37eae5170c3509c4db7ae9a4fad5cfe46
SHA51242ab3c99fbf87826e37881a3631fa3f9317cbbf5054c2b0800ffb090bb7def82a3b04dcdf9b9e945b6708453b60944f74114b02bc372e1df68b6bcf419733741
-
Filesize
202B
MD5cfd99f25275817e2ddcf5a80ce5d1f22
SHA1b26f2722d351f097938652501242033e5e2373b2
SHA2561566cc40f45d0df4e6bfc290933cd5002319c104bc32e07e738101869c884d57
SHA51290f529089b5052d3a563a822d4650e872f843aeb094d3d3b95734f7d9a5d4cafe4163d98bcea67f0b62db1049a39511c7363665d72537bf7ea5583cb063e6eb4
-
Filesize
367B
MD59722234ec639952d5aae21673498e8dc
SHA124a7622bfefb003a9dad1a4f95d8c57de2ec66ca
SHA25627b29dc01b917d61fa963c8a997685b29f7fa4bc4aea0b2f7c2ea8136292ff8b
SHA512b2c764dee50a571d17782750424a2f3eb6ab7f6a0e059dcadb8607ea9c6f2ba58e66bb370d39e15efed3a3df4e1d16a981fd394e198f33e88d2a485b8577cc99
-
Filesize
204B
MD5a9cf1308b4df81de92f9bc2e75a83d17
SHA195feac8ca2d6cabb13c0f73bc6bb0c223e49519c
SHA256b0cc07cb0392246750e60d21df868801da4fe630c0ff27f117a1fcd8671f56c9
SHA5123afb0b2e7c549684a36bb7e295f7c95bb4817362f26a2cc9e0d63fd5cd7faccf9b545c832188c8dbde12c7da8596c9ef5cba88ebd89b78fa6a783c68b2550546
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d7c98037f815342fbcddff12eae1e7fe
SHA1be5adf2ac1fa8bb1ca7e04bb25626939f9bf8f58
SHA25669d46dd463669009f4de95ff606f538d4ec4622f778574d7b12d635f3cb34b85
SHA512cd859641f7e39d932b1d275075566706f2c67f975c3ad86c115a94aff5a649006f3ed4551b1d006b85b0a4cb02dd718cfcd30519ad0963281e54e98bd2d4c6f1