Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html
-
Size
50KB
-
MD5
7403eec14520e5cfcc9c2f04e4747175
-
SHA1
8713a60d88c88bac2b81e85d3bb083c675d29a20
-
SHA256
60b3ac05305648d87bddef76f5cadd3c84a9000360a82c1c85ac161308495def
-
SHA512
0f99ace3094e197f99bfd175c6e5fcc678e529ef3fa28b55d24748ee0a546a07e8ebb2502f45a2833287d08737b42d7091568ff0c63b7d3569d945f2d7eb5baf
-
SSDEEP
768:672a9hy98uueqCeIkB8ek++Z8tststVvt2esTrjqPnOx:6qghy98urqCbkB7kMt2esTrjqPQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3756 msedge.exe 3756 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 4736 3756 msedge.exe 83 PID 3756 wrote to memory of 4736 3756 msedge.exe 83 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 4392 3756 msedge.exe 84 PID 3756 wrote to memory of 3432 3756 msedge.exe 85 PID 3756 wrote to memory of 3432 3756 msedge.exe 85 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86 PID 3756 wrote to memory of 4896 3756 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xb4,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13805809133973273599,3295550725723105954,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5aa5af79d8b0352c712e3feb66e6df224
SHA1f4e011ff90205bcb76f9fa4bf504eb72e0b1dedf
SHA2566a41e1142548f502ef46220c63c367c54ce83c47e505516512e14cedc06f4300
SHA512b97239986eb4bba8f8fd641c463b89034ba0c747a71b79303ca500e7f3c7a8a3ae8927379a58ce44e3b545bc70caddc216d75f913513982eeb19362e5391b80e
-
Filesize
6KB
MD553b4eda6022ee8a38a709a3fbe43315b
SHA14d2bbacdc93d35f8c61d9c4155994bd362696fe3
SHA2560c5e86455750218a8f76b44b83d37eac59d27f43bba2796c787c7a507815c4f5
SHA5120553a9f8ba349ddc9bc80188517993826a3e907aa1c28e2e388cad6a3b411c0e93c221f16a49e14b18aef6a3a099c67304552d7f616539b7f49ead6a4afd9bc8
-
Filesize
6KB
MD51d252ee23739059707fb651954d2d860
SHA1e7d9f2d55190ade7508d7299e9caa3d65de5ee9b
SHA2562ff2e06baa30b7161bab9a349988c68fbcc9a5b765ab386d4b4b1a15bd30d693
SHA5122ec4224d35ed2b17018cf91aabe27ee55346ba11f238afda24f76f21d944cbf6400e616888f5f92f49c14f2d1e3e2dcd464f2353f1c8da4fc17185f4bc4dc5bc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56daa6e65e3e9bcbc407824c133d452c6
SHA1a11f52c9c69cfc35bd580f8836dd6ab424d2bfc8
SHA2561fd3e52302e13b819321ea59f4c813f7562b5eb3d5a6a640d780fa134a06308c
SHA5122a227c4b275c0d10b98f9b2538c1f70c367dd757f91ce1a080557e9e248b21914aad3ca10155b845ed63a17c738ca98190608ac028e12ac779521681d431a494