Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
7835ce37d546e16a0a7ac9765cbf8329_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7835ce37d546e16a0a7ac9765cbf8329_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7835ce37d546e16a0a7ac9765cbf8329_JaffaCakes118.html
-
Size
27KB
-
MD5
7835ce37d546e16a0a7ac9765cbf8329
-
SHA1
954d303dfbee83b5e524b66c15606eb03b92c4fd
-
SHA256
d6ad3a8cad3ec8ecaab12a54bd92e530a499824cb31817cb9c7e5aab94770e5e
-
SHA512
73b3c69e1d0d47afbf66a5faa12c84cb0f7a40798a313c802e08aed4028dffd8869d26819714b44d2bc30b52d03c21f8eb702f5566dcf6d4e9bd75c35582bb3a
-
SSDEEP
384:mZc938FWb52rVscpfGQ+JLt0PWXQfFTeJn+zEI:l3IWVg0pxMWXQfFTesEI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 1684 msedge.exe 1684 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2952 1684 msedge.exe 83 PID 1684 wrote to memory of 2952 1684 msedge.exe 83 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 1972 1684 msedge.exe 84 PID 1684 wrote to memory of 4244 1684 msedge.exe 85 PID 1684 wrote to memory of 4244 1684 msedge.exe 85 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86 PID 1684 wrote to memory of 1444 1684 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7835ce37d546e16a0a7ac9765cbf8329_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1120771653506842047,16816473997527501536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5a82af4ea15494139802b3f683e3d8fd4
SHA18cfdb6a7b89f6f615fde8431030a58f7980dfce9
SHA256f76906f2bc6d40bd3a3abde224386df7cba2c507c6628c01d6f029265003ea7d
SHA51208d39ee0f799d15337b941ce46bef6209dd1d2250dd3e3a6428d3ccdbae89c2dd2395b46c3c889a7496e0c9ae166425a934e652b2d3b586ccbc811ac922a8315
-
Filesize
5KB
MD5cb3233446b0442d09744f778acbc1b9e
SHA1a3a3958d81c870895f08c5504fdc2984dff47b06
SHA256373e30111e056099c58049c141758ff46b0d5463ef7b65718d48aae3ec8582a3
SHA512ea89a134676c0b35fe669c056da2af10f3b7530bb645dc72f529a994492b362a0569e7cf01a12d958a5dcc9fa8af72ae1dc10fb0f861dc4c69e22736fd33db79
-
Filesize
6KB
MD59da4c91013a934e112431aab0a835001
SHA187108380d003ffe6e248a08c3dae787b30d50caa
SHA2560a39c046ae3c9ad1579b1a8b44a78ff82a00879a6630aaaea91137a8c3f102b0
SHA5124b79d385c80686e74b59f351df6f85d0311239d809d837d20f9d288d3b8d92ebee08c506cbb938102a7378c3c5f73a9de33658d6f7bb526de3c5d57204a47a69
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c465dd10fd37af8715676f9e0fc519ce
SHA11496a7f2f0a70e718fbbeace84ef682ecb33cd98
SHA2568d6cb4aab2ebb54ccec10eda19bf9d6da6ae4a9676ce4154b9fa30ce5361dd7f
SHA5120c22f1dd9ba42fd1fd84ea97f5171a73395d0e4d8eb0e62b9e642968dd00b249859542f6e08c59cf2b921ccef00343cbae96da0bfb7e131be8e9eff68ec6c20d