Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
7a0b57dc78ac266794ea1fe5d524916f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a0b57dc78ac266794ea1fe5d524916f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a0b57dc78ac266794ea1fe5d524916f_JaffaCakes118.html
-
Size
565KB
-
MD5
7a0b57dc78ac266794ea1fe5d524916f
-
SHA1
a208da6793eff0f02c40baf6945e0cfb0ebd691c
-
SHA256
b6d24999956a2c1c54ddae25228d930995a9321fbb2f2b417d9e7a6e6495560d
-
SHA512
230ecbcf34534c3b4157fb4cd485893db6caf3d9d730876f3cfbb1fb755a05ed592fc1997420053ab96378551ebe5ddfd3f9d74443799748bd555a4b131f9ff9
-
SSDEEP
6144:SOsMYod+X3oI+YusMYod+X3oI+YBsMYod+X3oI+YssMYod+X3oI+YpWsMYod+X3o:j5d+X365d+X3b5d+X3Q5d+X3r05d+X3o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 3764 msedge.exe 3764 msedge.exe 896 identity_helper.exe 896 identity_helper.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 1168 3764 msedge.exe 82 PID 3764 wrote to memory of 1168 3764 msedge.exe 82 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 3972 3764 msedge.exe 83 PID 3764 wrote to memory of 4720 3764 msedge.exe 84 PID 3764 wrote to memory of 4720 3764 msedge.exe 84 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85 PID 3764 wrote to memory of 1520 3764 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a0b57dc78ac266794ea1fe5d524916f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffe401546f8,0x7ffe40154708,0x7ffe401547182⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17249115809974684841,8136683059571945622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5c746b5e36ea7ccfe6db4a4ff402207fa
SHA145919f5a126b264747577c37dd5d3d9f875b7a7f
SHA256e90718753d9d2ddde2185055565e23a187af8d79f44b9321f2eee2c56e8b1177
SHA512e3dd9d792df4c9d432affaea51b0a8df6f6483e3a5eb22cffb72f9e40e7c68c909a38f8714de76a0b5252ee9d9d74863583fbfe21fd106b0b9f711f74792d2a4
-
Filesize
6KB
MD570ff1c5495e673f5e046fa1c20e091e6
SHA11a154f9c13d9715dc11abb9c63c73f31419079e1
SHA256a49be052f43b68321f0905465b63fb27426d1483fbbef40be2e51ed3a35a4fda
SHA51264a57cf47097d581653f279d1fc98d0d83ac786cba5a782e00506902a37bd17e196e458725c01cfcd0cc59f603966a0a3e297897e90deb8ad763dcd8c5716bf8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5881d79ca70b9aa072feeca353b50e019
SHA16794c58e808019bd2fb0e866d59d34dfb462cb4e
SHA256cf334e16759795223e125fb082eb44c1614fa31dd8fb54168dc8730f459676b1
SHA512ba7fa07c72325eca7827fd75deb6c8912043fbea69b55f35c32c540287ebdc2d697d28b4e277b27138c30fac334ca441612b0be9e8b17877d57bba714a6f34b4