Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
7a70d3c828e245eb8fce3d50f6cb8d4a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a70d3c828e245eb8fce3d50f6cb8d4a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a70d3c828e245eb8fce3d50f6cb8d4a_JaffaCakes118.html
-
Size
29KB
-
MD5
7a70d3c828e245eb8fce3d50f6cb8d4a
-
SHA1
6ac37d9b3dd689b482a7bb7b98a4aa96370130e0
-
SHA256
7332773aea0c9066edcb6bc12811fd1fff8f1429b4fc12be121238dd17feac51
-
SHA512
29b0cb291759da4e69ac2da70d4956b3e00d32f87518c8938e20a4c1d36526258381b32314b93eb97a05b1de22429df64f72d3cb0474c2b163598643251cee5d
-
SSDEEP
192:uW3Db5nSZbnQjxn5Q/hnQie8NnwnQOkEntzbnQTbnBnQhMCxA9H+OhgamdMZR9BQ:LQ/Mv+1xZ7BLP9QjfkiscXO2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 4396 msedge.exe 4396 msedge.exe 3036 identity_helper.exe 3036 identity_helper.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4880 4396 msedge.exe 81 PID 4396 wrote to memory of 4880 4396 msedge.exe 81 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 1428 4396 msedge.exe 83 PID 4396 wrote to memory of 3064 4396 msedge.exe 84 PID 4396 wrote to memory of 3064 4396 msedge.exe 84 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85 PID 4396 wrote to memory of 4548 4396 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a70d3c828e245eb8fce3d50f6cb8d4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9afb046f8,0x7ff9afb04708,0x7ff9afb047182⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1984 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15237678885561016776,9149802660482122968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD57a7b6abd0c207ed5138dcc94ef17cb6f
SHA14e0f8f65607abb6c1b30edd4e1487ca4dc178abf
SHA25655108240cfccb2c26e777cdb803a1e6e319e3d60493fa14f39cadcec2ba3ffb2
SHA51214fc188faaa51089f55769d672b250d910b28834952c62394c2051d7a5ead77204f3b80e60f1847c4b6c4e4dbd0b2e3432f4df4408d7b340af9e08505a89832d
-
Filesize
5KB
MD507b3fc50a6724ea46265d643ce7b545f
SHA1b7e66f3886b8dabedbaed5b05f6544114b54f5e8
SHA256aa47fa143968e4bec39c444436d0b69051cdb943d8cde2cec317f1d9d02f53f6
SHA512b93f7855fadab1f9e3eb4eee0117a02d82e657f4ff788f8081d06453c845f80b9472645a8e7fd405fb5d80c1946ae86ca6e1d85f1aff051f84de54389ebd35d1
-
Filesize
6KB
MD5a21f7f9e0b12df386b271b9c5fb0dce8
SHA10f2ee808f4fe13846813e739fbf623ac794d4972
SHA256971f54069dc1b968af661c47112abdf84860ca0c6577b37ddba512185293f5bb
SHA5123b0efb99cec7567e14bade38144cd4cf9bce446cda44addbf206c852df8665586c62f0f08a8bbf61f4ea4deae68ba43f472a7a18b0d395eac277c69a3da26b6d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5664e8bfeacdcb910d26e9c15a06c07d6
SHA1154b58d3b2eabb56c0f8cf0e7930ada1e87bf09c
SHA2561c7b9c6a7746912fac36d6a4d92b95096afa52b261e8f93ccbe40f3099cf45d9
SHA512bd88b641c2f7dac12e588cb4d0a04d4401f354f329f405b8a87c6740cf8329c863aa13045ac8d85470bc0158a2334ce227c2226303f1fa9df5fac912d73a9f28