Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
7aafd3ac88ea507bd2ddf59336672c78_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7aafd3ac88ea507bd2ddf59336672c78_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7aafd3ac88ea507bd2ddf59336672c78_JaffaCakes118.html
-
Size
10KB
-
MD5
7aafd3ac88ea507bd2ddf59336672c78
-
SHA1
0fcdc7acdeab58fbad7fa086170fcacb25a10276
-
SHA256
9a6caf945d2500d5db19639baf321a668949ced541fbefb92e9c87d3e0519f49
-
SHA512
13938c0fd0e15f19fee90ca5e12455f34dc79f90d45db7e19573823c6fffa9dc41bc8e9806780095d7faa63b74ce7c415183a79bfff04b4661dbf26a926ccfe6
-
SSDEEP
192:qgvHCt3yq7pFahnvJ8We6BtE9eAAkZqyIaOA5AVaQVD:a7pARe4tEeAPqyIyWD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4972 msedge.exe 4972 msedge.exe 3120 identity_helper.exe 3120 identity_helper.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4320 4972 msedge.exe 84 PID 4972 wrote to memory of 4320 4972 msedge.exe 84 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 2896 4972 msedge.exe 85 PID 4972 wrote to memory of 4296 4972 msedge.exe 86 PID 4972 wrote to memory of 4296 4972 msedge.exe 86 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87 PID 4972 wrote to memory of 2196 4972 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7aafd3ac88ea507bd2ddf59336672c78_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8686278554724200091,5685671153983632268,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5194db8c63e7cb099e5be9210a23e57c9
SHA1b1b756fdf0a734ed02f960131b0884e940b36f26
SHA256f8c616a3018d87f7ed7ab39645d4e918e8c0a4db904ed2844efb2de99253f1ed
SHA51214bf2a7b00a992d22c423b3efc677da99a7b8e41a30a06f76185b064c74af4d4b11c651db07645af9e4027e157f83f5dda7ab35325ba2d5ed426b3c3d9c2493c
-
Filesize
5KB
MD5fa8283495732b811b1d9ab04421920c3
SHA1be2bad14bf92f074bf370bdaa6caa662158ea759
SHA256753504d605aa894e8960dd78a4b8ba0f7a5a70a25de6d94035aa12c8dd1a3a8d
SHA5127615c1d802e7526acb08cd0dff2018a70a340003ba536fc70aa242d1449bbd5be8b5292d345082a33e516919bc33f7f30881567bb9b70262a83cc1ff0c01e069
-
Filesize
6KB
MD534007bcf1c91fd8b896afd5ddbc48b0d
SHA175aee35eadc7589a4fa7a932ed64e43b9b469c6a
SHA256fe3c053eb4cdc5c38187dd7db8c62e14c801d70f1a4f140ec15b7b2a116178ba
SHA512d19fed433e4c1e033583b3329a69d1e4105bef8368a1f97160320594c7a87454cbabf641bf251254a55b01e698d605f51b1f1ff723eea3f59bac67b61e99775c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD511ad5a5c35882555c60c526fc9de3771
SHA1256caf5b20cd4dd4fd09684df21cc024121d165b
SHA256653ff04e79e71d34e64765fb6744866227621fd2a6d64cb36ac56929e58a7065
SHA5128dd22351a375a5b1a3d7cd49303c9332fa56221f014ab7c2e480aa04176a6ef2c6f6af1d58608c9c7ea286947f7a20dd93f9648ad5fcf1dabfc90be53365de32