Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
7a1d749de19ff99c858cd7489f54fa9a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a1d749de19ff99c858cd7489f54fa9a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a1d749de19ff99c858cd7489f54fa9a_JaffaCakes118.html
-
Size
243KB
-
MD5
7a1d749de19ff99c858cd7489f54fa9a
-
SHA1
4627ec8dec9aad11aa2aa546da10eae8fead0905
-
SHA256
a145c7446e413d76a20194d0882bf9674ea525fc9109500e3278205bf2c57241
-
SHA512
406596c4f13ce7ca97a0219785a731ac0640204e062f17e5001e3808e3d9b55c68882bc6995237dc2a03a68813703fe2fdcd689bbe6a73f0eb6a0221bcbe5d43
-
SSDEEP
6144:QZtiu69pxkZJwO1CA5kiDb3CyQ5xrQe/0STMb2fPXt:QZtiu6eZJwO1CA5kiDb3CyQ5xrQe/0Sz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 2372 msedge.exe 2372 msedge.exe 4592 identity_helper.exe 4592 identity_helper.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3640 2372 msedge.exe 82 PID 2372 wrote to memory of 3640 2372 msedge.exe 82 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 3524 2372 msedge.exe 83 PID 2372 wrote to memory of 1476 2372 msedge.exe 84 PID 2372 wrote to memory of 1476 2372 msedge.exe 84 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85 PID 2372 wrote to memory of 1848 2372 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a1d749de19ff99c858cd7489f54fa9a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf08346f8,0x7ffaf0834708,0x7ffaf08347182⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3082019345889344614,1834037653809238096,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
183B
MD536e530f1819729cbde3b8312d0369762
SHA15bb52f8bdd1d5bc6e5852df0302054943703c825
SHA2565f90bb6703e01223e4a8b3c8a7a30ab50278021f065ea230422c1d6be3d6e868
SHA51234afec7579589631952d5a33667fd6ac4c1bbed01e857de4c6acaaf77070a2b777a07f0a956acd8ed032d133e8d6d5a0d056e1690bb5f64e94006e659c98f3f7
-
Filesize
6KB
MD58a6096283b2aed34cd1fd2e5c5c59627
SHA1f1c0e0cfef07764bb82ea0d75420f40ad2232e92
SHA256dc560918dbdc44c72bcfb5ca0c4f1e17923798b7a5d0e791bac7c6e0ad83be32
SHA512fe6a121e1b6f368017ffb402b701adfe51cd1d546885b3b3b59b43f1329bb82692e36ce8e0d497ec31d6c2b61391b556a9ffd3c38ba2b6919740c521d5a0454f
-
Filesize
5KB
MD50161eeb545103a53a199e94e1cb0ef80
SHA19c5604b1725c74ce4bad5ebcf5995a17bf1c1eed
SHA256c04768cc60e5513e93b5a8157be338500e7e2adf7d296c94ae11d0a305f7dc6b
SHA512e813ad0a1f4e9818c8a44a370cc615b350d7b7fb3e1669ebaae65d581877b54ef6abf9580d18e4e11f38a7ee19b371c54171d11ba9251d103985def8f38c36ff
-
Filesize
6KB
MD5a7282d2376c743bfce36a665fa24a2ca
SHA1fbc20c38bed528a2c758b6e774ad724b0d8580ba
SHA256db759deca66356d2e96265ad142b5df8924f95bdd21d5337f5df481cafb07411
SHA512da83a57ce2c7cdaea1a5ba9f55f53dbf652f9fcc31dd0777e31d29988be08ac48baeab29f30e1428342398188c4183373fac361adb5a88dc6ebc904fec898783
-
Filesize
203B
MD55dbaa2c721fa3b0e663739cb81cf8036
SHA1855038a5aa4311f35062ddbcc73523802b2c2fbe
SHA256e9b834f9ffcbf8308f47834957f1ab7a7dbdbcad5b5053f4145c1b9ef7e2a445
SHA51267502fce655af42a72b73c8a4ade9fd13b037da75507157e85ea478f5c9e1a678f55bb9eda6f1a41867175ccdf38e54dcf3bf01d09cd25e0d8e668bcf8b2bc1b
-
Filesize
203B
MD557c7c0606a2a7963c52b1088d1a9fd8c
SHA17533e13251de2d3d75706f56ee301efe28cf3b26
SHA25641c96ce35d516c3eda2a9c88b3d0ed3ed1509bd9aae6858a92a739946991260d
SHA5120b1e7450d2a4be652d79a08f55e2a7d637200bc0795df6ece9a8cb2d04120ba002ec2cccde2747b2364cfc94d2d154985294831f942c9be435be1b03ef91de07
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5542c210fd46401a861b0a1c2873e9eec
SHA1c7c06163ebe86e9f1f45854f51c8b35539738b1e
SHA256f43fd6f5b7ac975d16b806bf0c3906af432ce2ffbf6dd3476817b8441e1d5588
SHA512418f3b55e9c0db128dad5bd170422c98cbde2242ec83a42b5c9473c2b36a7c4f7055a4f5a8d9b066a6597bfa8d300d6c9fce36d0204543e14614689f84b1ac93