Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
7a905fe7a53ce47d74a83f5840471148_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7a905fe7a53ce47d74a83f5840471148_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a905fe7a53ce47d74a83f5840471148_JaffaCakes118.html
-
Size
201KB
-
MD5
7a905fe7a53ce47d74a83f5840471148
-
SHA1
e4122d8a7b9aa5933faed2d9408ad3fe44c62d70
-
SHA256
2162507b793709b42ba6c67e1f3edfefb1d3ddbf5c15acfd647d43c149663763
-
SHA512
81baa7600bcbc946fb984e476fcab34c5813a72bdcf31160dd8492bcc52d66da4020c23076b636c8d3a14c894317f05f0306ee5242f3b0d5b0ad8a2e5e3620e7
-
SSDEEP
1536:kaWenEaqrj9f7xKpaA9ukqkOyE5MEleN7CPIzqlrGvM:dWF++
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 3244 msedge.exe 3244 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 1332 3244 msedge.exe 82 PID 3244 wrote to memory of 1332 3244 msedge.exe 82 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 3808 3244 msedge.exe 83 PID 3244 wrote to memory of 4872 3244 msedge.exe 84 PID 3244 wrote to memory of 4872 3244 msedge.exe 84 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85 PID 3244 wrote to memory of 2924 3244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a905fe7a53ce47d74a83f5840471148_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0aba46f8,0x7fff0aba4708,0x7fff0aba47182⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17358536879952249025,3648721077583823441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
255B
MD56216a07695629959bd035d0fbbce1706
SHA11b4849422fd2d05b90c95b79af525ff7bdff2f9b
SHA256d5f4ff7858e246040cb1f2e5b11eb2310a483a398a7e361936b02457a00b0702
SHA5120e46fc6091473e812a6b084ae2960e5721a69c6a7fbb32807ea4db735292b0de4cfb0c047593874fd0f07b56b89efa288596747d9978e3f625bcd39297e0b41b
-
Filesize
5KB
MD584825d310ea367199bf3ab20b6bf3549
SHA1969fa84845e42353e807d1762dbaa31f3f44b6ae
SHA2566a63229551f3f44120b821b7de957416b77d9f7c1e9a38407b4d6ac348748a7d
SHA512f03038dfbdc187f3c69361c2f12b0c2e0de02bd8375c54bb957b72e05f3bd2530c920a89bb1f4e4c151cfa62eceb941f64a70e8e219cb3bfb996316f0db5e789
-
Filesize
6KB
MD50fe5ebba7036fe12110611b2c1b2cdaa
SHA14426fd108ecb001246a9728e958a73440d67f15e
SHA2567eeee482e31fd5f8e339feafc240ba0db1b32458a29ce81754df8882dd5957af
SHA51269ae390fe6ca3323319675df2ab728c0e01503e3d696d7f55e5a75a761d8963890e2d2629e952dcae2bad4f6231fcacfb0c6741ab122a02dfd9847eef24fd449
-
Filesize
6KB
MD5a35c9e0a8b6a20d167fb871e1f86c6d4
SHA14644a08156448b99ca0b40b377d18029ebb4eced
SHA256adb410925a81dc11f082ff9b1ac5006b005c0d5dcca6e738f521bd26db466119
SHA512b8d9653891d98adf1ca4b4301d2d7e3b10e42417d4966cade3948a76bc4c034836fa652effd96f9863072231944f70d34f012aae06409d05546e449057042d48
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57e98b2f19e7af1336408e54399d0197e
SHA13e9129603bc2fae1e65820346b91b6b5a9cd91e0
SHA2567d236e41237d794f36c1f1b00300b400d7a4767253aebccb0bef76aafc8e59a0
SHA51226d46b55fd321a936d5dd62c0d81d566747132b24d10f5d2a005a7dbf7662e368daa20e54e69c7aaf04082c8c8522e2018497b258ab156ed93a6201952b834ba