Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
7a827b3829acc8b5d8c657356646744f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a827b3829acc8b5d8c657356646744f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a827b3829acc8b5d8c657356646744f_JaffaCakes118.html
-
Size
213KB
-
MD5
7a827b3829acc8b5d8c657356646744f
-
SHA1
6760341ebf69db842377d92d5f420eccec292ee9
-
SHA256
4fc33b774821246cde0da9057bab92204db99d499ba986ed557732685f498a2e
-
SHA512
8ff5ca0557c0ef005ff4c031256804523421ae44d07417a7b32c41cbf7363730ee5f35f78b15f7dd246fabb5e7b1831a0dcaaf46ecaafe0fddea8325c41e2068
-
SSDEEP
3072:9rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJy:Bz9VxLY7iAVLTBQJly
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 884 msedge.exe 884 msedge.exe 1040 identity_helper.exe 1040 identity_helper.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 1456 884 msedge.exe 82 PID 884 wrote to memory of 1456 884 msedge.exe 82 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 1088 884 msedge.exe 83 PID 884 wrote to memory of 5032 884 msedge.exe 84 PID 884 wrote to memory of 5032 884 msedge.exe 84 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85 PID 884 wrote to memory of 3920 884 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7a827b3829acc8b5d8c657356646744f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8042219362169608639,5000575439715767506,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD5fb7077146b04eff02c186aaeb8a84246
SHA17446f16c11e83a6545c2fd372ac0ca6c78d1b62a
SHA256906470cdec125247606a5e1561d771cdd6936a96d9f8a21e8f3369c30bc9e9d0
SHA512434176a17eac97a1f8e3c8f78de2c5b3676c512d16427db4a5bf90c99a1dd4a8fc89d82ac56136284bfc4572e964c6ff8025b01eab64c20a043eacf5f0423015
-
Filesize
5KB
MD587915b74341bd447cf817bf83af76021
SHA104488776c64d1f99ea417f17fe05d5419dc57641
SHA256596cdf14e909d2ef4d1af970bf27df4f6afbb6307b9483463b6562d107b4c073
SHA512fc16d0bae109163f8f449d1c607f320a60872eb98c65ea5358a7fd6c138f970f52ad090bd55e43966ee18a50226be109bb3eb035ba51270b5acd40758aca236d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD550030a52ebe9d362b9441e1a0193d01f
SHA125cffc268845542e0d76ab9376421df1d5582583
SHA2568eefa3bb00b458b44c8d10218194109149f65144706bb132609a34eb50747c46
SHA5126d2d1aecdfa9c30c611be1183ba1023723677482ae7747bdb629bd669ffc2515fb0086a2fb2f8d2a40b26267439729fb96f82168c9fefb780b72181990a55e5a