Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
77cef7145505f7ed0f86f8a342a355cd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
77cef7145505f7ed0f86f8a342a355cd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
77cef7145505f7ed0f86f8a342a355cd_JaffaCakes118.html
-
Size
30KB
-
MD5
77cef7145505f7ed0f86f8a342a355cd
-
SHA1
1987d5169dfab64052dca2626254a15ea44c1240
-
SHA256
fa8cfe449d3c9e7d795c9c04503bf21ca7bd6f44a5d49b9b5843b2c204fb74e1
-
SHA512
a0873b338ca0f561e2236ad5406da6692f39f9a52de7e8967bf13439c56d610ccce4ecb333183087e7f3f6dcf5a2254363256497d15cbfc15f8c8a0ff7effe4e
-
SSDEEP
768:XGCmQVixVUxb+tz/3OidB1u394H2p2m4hTYVxLmIdtj3VhTYbU3MS7uZgnn+6IED:VavWNb2m0TYVxLmIdtj3VhTYbU3MOnnH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 2320 msedge.exe 2320 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1188 2320 msedge.exe 82 PID 2320 wrote to memory of 1188 2320 msedge.exe 82 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 4900 2320 msedge.exe 83 PID 2320 wrote to memory of 3664 2320 msedge.exe 84 PID 2320 wrote to memory of 3664 2320 msedge.exe 84 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85 PID 2320 wrote to memory of 4400 2320 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\77cef7145505f7ed0f86f8a342a355cd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffff2ca46f8,0x7ffff2ca4708,0x7ffff2ca47182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15369007034976893786,8148143383029096462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2528 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\46c404a7-00d0-4c78-94a6-48e93bed48de.tmp
Filesize547B
MD5b53b69195013eb13d30441cd99cc3d04
SHA109dcf4c7e34818f04f67fcbfe15a7db06c4398c6
SHA25679b2f27ffe87b4879fcb5a86f5c12021c28e2140a2fe7741464615f7be9e08e3
SHA5128f28cd88ac7ce4871b1bca2512d42c961d0d2e52e9ea94ce5308b5fe54acb70e6a4abc6fa6d17aa4fde23cecd240d9232f969a0b19510d2e6ef8d8f2f89fc3e4
-
Filesize
5KB
MD527dbcc57a9db69b0a58df1440ca264e7
SHA178506dccf5bf3ff728094a493cda657b020e6477
SHA256c1aadeb188ea390a3a1efa26cea192fe0089acb053beb3325b44e9f266f5e7f4
SHA512fca255afd17c9f3022942b620a7a8b893a506aca382a8f17b0b76ac7db524eef014ad01dcf4d072cb9f82c6d6b6fc6a5a9ebd7c8795ede83508b0dfe287ed534
-
Filesize
6KB
MD5405e155c36cb5079cf9305bdb881d6a5
SHA10feb6c6db7588fa900d8c840ca46a1517fedd39e
SHA25639e6d849ce543b98fe2d4f90f1ff7ceaeb0306ff2e53e6aba5d2db84b4b4ce12
SHA512b0ab04c1466243c716fae0b2ce7f7ee343dc0c6d2f8877506cbded7bc1cfe48f0394c1622260f20b5d46ebe468da895710df116fa2e7b052cde56c284ccd178a
-
Filesize
372B
MD55dd66eab74b478796b7aa0151272bf06
SHA1e40c43094520602dbc30f037242c74255c11a1f3
SHA256735bc4ce941f0723a0cddbbf90a354ac9e62cad97bfb53ba5d0e0269cfc9716c
SHA512b187b42f6abb8e09724519208b64f966e52efa55b09c37ca2131815c7fafde1358d244b33adbbcfc5ee24273d5bd57b273e589c8ba293ac3c31cfc6b7b18debc
-
Filesize
372B
MD5911aa1129a37c2a69a01d01855e79b11
SHA11b0b0367c8806a36ca3290074895a6ef40f322c7
SHA2563b8ed2114745ca0bd559d3a93455372bdb595a750e9b060ac96bfb410446ff76
SHA512f3afca682eebe5d4571aa6760f458149478c7acc67accd1204111a8d0fad123e7ca49e6d6df276af16517347e86f977fd5e11f42432908c87d40a4d00d55cf16
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5165e67e0a27cd332053fa3b4762be210
SHA140ea071a27709dd119e6ab5befcac5b98cf9d419
SHA2564b83dd585c29d1e89557cfc4b1c184f6a9b0b2fd445debe0374fb9ebc00b378c
SHA51243d5055babb8b7c011b7c479202286837a441f0cca49a90cdb2ddcc57ed67c1e77b39ba3cdbc85c99aff8e35bd46145cd9c0bf9665f240f2ba341eaf60d47ac9