Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
7a6b5f60501c52da9011bd9156790020_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7a6b5f60501c52da9011bd9156790020_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a6b5f60501c52da9011bd9156790020_JaffaCakes118.html
-
Size
72KB
-
MD5
7a6b5f60501c52da9011bd9156790020
-
SHA1
2bb7584425fed41470e79acf7a0ee5147751e879
-
SHA256
9f3c5ca7c92fe6da080923d76badd8d6d86ae3cc4d6f2db03425265e1afcde4f
-
SHA512
6916d7e7aa7d0492b2a187d41b34025587747a3693f42e77d4bf6980eabe8e021d93e7fc33a78fc544619966a2f95cbbea7e9b09924940ab01d75077c1990a0c
-
SSDEEP
1536:BYhhD+kr9mdWGTsjgQSW1FHAMTFY7TcFjDvYFglyFGFFKEZJ9n5nL0lqyUKzvZ:B2N8WZk3WLgMpQTSnv2YyFEFKEZJ9n5U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1820 msedge.exe 1820 msedge.exe 1700 identity_helper.exe 1700 identity_helper.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2180 1820 msedge.exe 82 PID 1820 wrote to memory of 2180 1820 msedge.exe 82 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 2252 1820 msedge.exe 83 PID 1820 wrote to memory of 1472 1820 msedge.exe 84 PID 1820 wrote to memory of 1472 1820 msedge.exe 84 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85 PID 1820 wrote to memory of 2744 1820 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a6b5f60501c52da9011bd9156790020_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc74146f8,0x7ffcc7414708,0x7ffcc74147182⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1148 /prefetch:12⤵PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4728353583177497134,8781963132134194732,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD583c958b2ef948f45af7055b1f2135514
SHA1266e6447c2d524bcf12027cdd558caa7c10e0665
SHA25604daa85f0446e649b79d99b3f6b736b4d7df6603a44b8ba1230b8e1f07f0777f
SHA512945137e76b7e852523862153354625d495dc81ed1f72f2607fb7ee4adbe7f65553bbeb74a09e4fbf0e87eff06b27e74fc3d9d1c561050dd7b44d500cdefc1d62
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
336B
MD5d6995bdba264afe9ffbe41369e366b18
SHA115b8839412dd963633404d19489b013fe9d42095
SHA25698d7b0d51dd7b2d0202fbd2d14935c1ae6830c8372945f883d2ab2666aeb3208
SHA512fca8f8cee54611a46ca9c988448b2c1b969e3bcbf35508240cdb3c33af0c48159412c9af17630ba675a821965a1d8562e9ca35413aea5f955b105e9de7b6ca53
-
Filesize
6KB
MD55cafcceb2ab8ad5442fb090a6e6866f3
SHA14946e12097a090bacbdba0f939175da63e49692e
SHA256a8f5d60d843081765dbfd34897e10b9a6a31f4ecf6390c4bf36a0f2e1b19faad
SHA5123695d3382d6b72848db36acb670d720a8542a504a72b3325a0808a5bd8b9f8b9a5ad2263cc7ef81cb01991df41b58f2267af1fce6e7145e9adac7c117c87a2ab
-
Filesize
5KB
MD52ebdd3716df4b15b5565a0f1fb6f4179
SHA19b538b92fcb701230a1c901ca323326cd44560ef
SHA2561534d36a4c5af44571461e80fb9f12253b6625156d80abaeedecd3df54f138c8
SHA51283deb49e33fee758b73c02dd4c0cd383695ce08b3b24b10a776f608a71ef2f67b18d67832ebd1e7eaee389185ff83eea587c3c5ba60713023aa16137fd09c2e4
-
Filesize
6KB
MD53e67faea6425b9eeec6042a9bde92ceb
SHA1ab85774691471a9a4d234151014ef0ddd539c763
SHA256c8fa90a4450e2baa00a51cec84ac656cc67e9764a6df84669606c86e69a33cc5
SHA512dd01e0beae9d18df9c130ba27a8ea2223746aa3a205970086e40f863d721bf7c4c4347972900fbdecd91c87a97d2fedf9717fa177853fa4eb6760145a70262d8
-
Filesize
371B
MD54cda44660b2b96a8f01079928cf17a62
SHA1620cc463ddf733d1e4319fb80135d9e064607add
SHA25692030e8034f6c85ddcf98e5203c16dafb7ebbebe68105a89e311e21f2302f7c7
SHA5124690435a79fea164b0852948a5ac87e1327161a0fd16bb0ec3984a62cf1d2fddd7e4748f7fc67c55f41988d3dfcf735e35d1b3dd61fd583af24de1b559466638
-
Filesize
204B
MD56cda3310da7e0e6cb24ad6cabe08b39f
SHA12af3c6210beb921d083dd5c91858dfb2a480f20f
SHA256c73ab13e7908886713d9934812b809acf06f531572c54d2554aa93c2ef5b1514
SHA51257fc8b9fd2fc8c6d7f65e6bfbc6a2c139930b1c2977f5dbcdba285bb1b3bf2fd63223705722ce0d69f23cea73ae95ad8d62d49bf5403a90a1ed328070d7dbb9d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145