Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
7b09db0fa46dcbe4f3a6b8a9d1f00403_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b09db0fa46dcbe4f3a6b8a9d1f00403_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7b09db0fa46dcbe4f3a6b8a9d1f00403_JaffaCakes118.html
-
Size
139KB
-
MD5
7b09db0fa46dcbe4f3a6b8a9d1f00403
-
SHA1
fd02333e2dcbc3eb3ad759355d199bc1d01f91dd
-
SHA256
4c1603f11f6ebf3852321ce796b907f861222ae51968aa9c4c183b5a98919974
-
SHA512
728c6b8ec51d4f52042edcf9acb39ee0dab88f34828c8846046db71d74fab95846391c19813739fac6ac4d217bdb3271c5473a94e744b41e7bfcd36ba850dc7c
-
SSDEEP
1536:SAFa3WlroyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SAHoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 4104 msedge.exe 4104 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 1132 4104 msedge.exe 83 PID 4104 wrote to memory of 1132 4104 msedge.exe 83 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 4332 4104 msedge.exe 84 PID 4104 wrote to memory of 3716 4104 msedge.exe 85 PID 4104 wrote to memory of 3716 4104 msedge.exe 85 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86 PID 4104 wrote to memory of 3380 4104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7b09db0fa46dcbe4f3a6b8a9d1f00403_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6af646f8,0x7ffa6af64708,0x7ffa6af647182⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2423023649890372863,12277334335739387608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,2423023649890372863,12277334335739387608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,2423023649890372863,12277334335739387608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2423023649890372863,12277334335739387608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2423023649890372863,12277334335739387608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2423023649890372863,12277334335739387608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD53b75fbe8169915aaefa8e0aee393997b
SHA10ecf8df3200602ba5d2d1210375c69afe7cbd63d
SHA25669e92e181cfc94875055104423b6ef895b4a17650168385176884f6abea0188a
SHA512f92441213215fa9244e08ee921ff6d0fbc870bd2f413bbfe25dbb73b6992549a6ab2efd85ddfd83802bd36848bf3071416213992437a6316a11842578b0b74a7
-
Filesize
6KB
MD5c2346af168e62885b0e83c8390897d78
SHA192364bd81e034eb06392e0e5ddcbf9198bff7da8
SHA25699d925c556ae6988a00d246412810b61f4bb7c3a2e26304700a7999379fe8690
SHA5120d825ef8a5a072aa5561d3d7139fe93525e20e09b7c2641721b2d2b5abfe7886806a7c180a3d894fcc441260704eeb418a2e44f6dc36bd67071ca07aac77b57f
-
Filesize
10KB
MD5b1278ded306b95860b5d418454ac6f2a
SHA1b4eea7cf39fb007fba7c88e04433d53de6c1365d
SHA256468760e42a4f8fc25e798802d2b8962d09b3e73d82ac0376133ccd21ae61c428
SHA51222b29afc8eedd112e49375aebac7f9c1d226a1c85c000f8f2b27300c804b857e6c25c0fe7d3239c620d454835be1560a88bbc22aef492afe3a2789b3d7a1aea3