Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
77fc7e03f72b2244b4d86d75bee4485f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
77fc7e03f72b2244b4d86d75bee4485f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
77fc7e03f72b2244b4d86d75bee4485f_JaffaCakes118.html
-
Size
468KB
-
MD5
77fc7e03f72b2244b4d86d75bee4485f
-
SHA1
6aeb761bf54bedd04bd0c9ec3b41015b141ea332
-
SHA256
f4e1e231a79a515e73c73b1c9ce7224804355e6060d992be2fd6df7ea9fd3f11
-
SHA512
4a0e2917174656ef67a288574f0cd49bdce01785fd0ccd73f2b06d6051a8725aff84533b559bb653c2391d4c53550294e46c17d5a9191a6d5a832fe319aba094
-
SSDEEP
6144:BUpvsMYod+X3oI+Y6tvu6xAmzM86P5sZpMFzBtug4r1GcFBU/b:qpz5d+X3poCPuzmrugwG2qz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 2760 msedge.exe 2760 msedge.exe 3848 identity_helper.exe 3848 identity_helper.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4752 2760 msedge.exe 82 PID 2760 wrote to memory of 4752 2760 msedge.exe 82 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 3148 2760 msedge.exe 83 PID 2760 wrote to memory of 1520 2760 msedge.exe 84 PID 2760 wrote to memory of 1520 2760 msedge.exe 84 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85 PID 2760 wrote to memory of 3780 2760 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\77fc7e03f72b2244b4d86d75bee4485f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff9fad346f8,0x7ff9fad34708,0x7ff9fad347182⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6507028730781719630,11632111320850959542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD54609ece3924b41207f017cba622314ed
SHA1d954b563a47fd74058167934ca0c58ba6984c839
SHA2564e1d97590a8ac161982ce9461ae6a37b7062090b47ba67278f9316509c8fc4e4
SHA512a2ee8f7e48a4b419fdcf4d9a3e3d08ce757b3d9c6af1da0f9ea719808fe06262d77850e42fa52996440d0f42a50f9f54b6918c337703f2d4462fa1bfa0dd40dc
-
Filesize
6KB
MD52aa5f92e0850dd2577fb8d11837f2eba
SHA10cebdd05da9e924801bdedb7b257f156a43dd7ef
SHA256b8f0a22642f658cb80e0fe571d2dc3e57649e430e0eb64701e6873255b9d2dbd
SHA5126672ce5e803a9fed61bcea2fa4bc9357e29ff4af11bd6482415d75d10d42c53938ca63c7ef795a0138f905bd5e639b3e8211fe999f77703eb31929f7748a144d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5807e960c42835c63a88e42e597f22bc7
SHA1b6fc1af204c22b54b8c2ec1f6846b9fa121f95a2
SHA256b73897b2fd139560749fff6d3db24b066ab5e9ee2607c58c907780f6acd30352
SHA512e18b3056f779a27609f2a6bb7cb8622285a7cf252539f9ca786bd20195654449b9979a1e4c70b44370634bc234a3cbe3e0e6a7a4ebe4bf3271af69e6173b05a1