Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
7b3ffb587c237687ffa9c6416f10dab0_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7b3ffb587c237687ffa9c6416f10dab0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7b3ffb587c237687ffa9c6416f10dab0_JaffaCakes118.html
-
Size
62KB
-
MD5
7b3ffb587c237687ffa9c6416f10dab0
-
SHA1
376e14b712dcbf732ee9eb82e259687578bd8624
-
SHA256
7a074fd080837363496ccbc6f17d5de9317f4c59760f0379b7785aaf79316cda
-
SHA512
5f89907d5153325deff57720a91db00b1e746ed7ecf603c027c6bae2ccc505e82dd9feccce852fda5d4e5192c18186cd875cd6018f97180f2814cdab7915984e
-
SSDEEP
768:cbUPNx+eB+en+eB+ep+eaLFJ0N+Kc72YneXz4UnBb:YUPNx+eB+en+eB+ep+eqhxneXz4UnBb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 1484 msedge.exe 1484 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1608 1484 msedge.exe 83 PID 1484 wrote to memory of 1608 1484 msedge.exe 83 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4636 1484 msedge.exe 84 PID 1484 wrote to memory of 4168 1484 msedge.exe 85 PID 1484 wrote to memory of 4168 1484 msedge.exe 85 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86 PID 1484 wrote to memory of 3564 1484 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7b3ffb587c237687ffa9c6416f10dab0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff561b46f8,0x7fff561b4708,0x7fff561b47182⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,6949683808991201220,2896039357301817446,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
254B
MD5418e8f0d0b56e82342466859d9d3d882
SHA1e769cddbd4e975f7ed5baf6a1089c274047b6db4
SHA2560cd248835bf327a0118206a5abadaebf8de037f87962beb900d2d474d95a479e
SHA5122e9fc757d1a45585ed4b45bab3ed29d765a497d0aabe7f39614098a13786b56bb40e79d6e4e45dc021a51a37d7e1a5b9892f25497fbcc4ed425b2de34fbf9230
-
Filesize
6KB
MD5da2d19b3895713ea74e045da1baded97
SHA129786c2f5b041244aa676b5716f7e16a419e967f
SHA256963cff8811644b70a21029d23b6cfc24d65dcd92600cc9ab0a52281aadabe5d3
SHA512ea76989c2666a2fa33f4b74c3d30ee185e2e4c259e63c0d782082ac63a25935269e64bfd2499ed2d544c58988d26582fef5d325bb00eb6360df255cd54395266
-
Filesize
5KB
MD507f9d8989fd17d33aea3bc84ff69abab
SHA1635f8db84447f992a9d185a6e668492e2f931950
SHA25607550e7e8ad9b8440112e93086e7e87043f649224d07ac12c8b0faec910b978b
SHA512624d83dff88d290aa4daa8ac4e95ef460f4b8d0e35eb2b40296f6b484e37f529857d2396307d5859a6d228b44b729419b489e5f086ac9515244c393c96c9d3d1
-
Filesize
6KB
MD5ee19b0900eb9035fb8410c4a7ff15e59
SHA1ac0ee0f65aa13c60ce1692b2ed40f909bd3f2d8c
SHA25641db202e6c7a4aa8f0ee987fc776ee3ee94d9cb51bb01a7064b9da45cd862c5a
SHA512f5868fcff8c23a0fff5b4c243e4759906b49b5fdb75707b1d213216ce2b16693bcc024e6dbef37809495070cd3b1abcafff7e6869b7f94a91bf6a63e1734ce9e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55c7a87ee029bd027aa16d90d888641a1
SHA109fb6d3d7c155e88a0cecbd310f0ade33e5b41ab
SHA256ce605f6afdae5aa4c843b49ef2d461856a69d998dcc8b548573f99d962c04f80
SHA51284bff446b48a9fd135328f2ecee9a6c3b50f7c7380403b13716e90b820b4b0de411fe9848aa478528059cc07417e21b3883859c69171d8fa572bfafcb63597bb