Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
7b0ff3ea85db3f629d8543f7a4c327a5_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7b0ff3ea85db3f629d8543f7a4c327a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7b0ff3ea85db3f629d8543f7a4c327a5_JaffaCakes118.html
-
Size
139KB
-
MD5
7b0ff3ea85db3f629d8543f7a4c327a5
-
SHA1
30e30380a404a758ce3654c93d9acbe9c8b0b7ba
-
SHA256
736255566c4efb44bc3cd280114478796ee60ed61f4654bc391c8c78565b3bfc
-
SHA512
00e036025e7639393567aaf331ffbfb334712e3be585f6a6163ace54f27cff0f009042af7233dfeb6c924070c5596c1d664506593d49e10ca6e0bb9371d923c0
-
SSDEEP
1536:SsLNS9Sv+3UelryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SsLQPyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe 3344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1952 3344 msedge.exe 83 PID 3344 wrote to memory of 1952 3344 msedge.exe 83 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 2536 3344 msedge.exe 84 PID 3344 wrote to memory of 5116 3344 msedge.exe 85 PID 3344 wrote to memory of 5116 3344 msedge.exe 85 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86 PID 3344 wrote to memory of 1528 3344 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7b0ff3ea85db3f629d8543f7a4c327a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13207694206642477599,11408541742501782718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13207694206642477599,11408541742501782718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13207694206642477599,11408541742501782718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13207694206642477599,11408541742501782718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13207694206642477599,11408541742501782718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13207694206642477599,11408541742501782718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5e11152669b9a08aa839e91d04318bb5c
SHA11b85fb7f66e6d276e1640da5ea6e0687f952120e
SHA2568ef3ce3d87ead2aacb18d1215d1471240a325e09a4061e4bfb54ab8f51ddcd89
SHA51296cca8e799eeb3eecef88ea99de0efa799bac9183a41d64dd13300bbc33c7439f3587aa52de2c0d3b4714dcd87bb5498642a47c387953bc0fe79182273996c1d
-
Filesize
6KB
MD514303b9febe14a564eaca128ffd7f52d
SHA155c545b529ac0969d7f6becd2e6b4ace1084e605
SHA2561bf04fdb5e607cb3f249dc675622e08bed7869ad9b1e84f6bf56fa23d1632d5c
SHA5121a7847c9ffdcc9d3c74d1eed40928dbf8161c40a4804087d7968537999358fce859f4fd2323f8a901a42954800179269709dc9f92475a8e5eadcc401ef98c0a8
-
Filesize
11KB
MD5816b6e6e0de63df1321e35315285848f
SHA1fad4fbf9170833f5b1553218d21e0be78dcd702c
SHA2569694b76deab1ae84c102b92d126d073964eafeca1d61e6aaadf69ff42888b83a
SHA512a266e0ce5de8d2bffe31c2fdccc7189edf5764fbf0f04abb651631c7a71513a5ec0d035750d465dd49d13f0c788240a08e3f8e878e257d7827d6bd59abe76cec