Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
7bde56ae34eeb0fe6db85c5b5e674adf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7bde56ae34eeb0fe6db85c5b5e674adf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7bde56ae34eeb0fe6db85c5b5e674adf_JaffaCakes118.html
-
Size
207KB
-
MD5
7bde56ae34eeb0fe6db85c5b5e674adf
-
SHA1
ecbbd8a6472bb4b2c10afc23d768fd0808aee238
-
SHA256
e3bfa4715157f476333554c8ad3a66f325d6261c7aa74793e6a40ecba2c46716
-
SHA512
35c06fc77c60c1fa0b777d82a67ec18657d9189251b67c92ce7ee5eba146f62db7bea968dfb298fb14c99fa5dcc374537c4928ce6d34ab303fd130f28e7bb6a5
-
SSDEEP
6144:W530DH6NEQwjcHXxQRVufJc/09V1kMI5Z:WuDHQmjcxQRVufJc/nZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 4764 msedge.exe 4764 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4328 4764 msedge.exe 81 PID 4764 wrote to memory of 4328 4764 msedge.exe 81 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 2516 4764 msedge.exe 82 PID 4764 wrote to memory of 1592 4764 msedge.exe 83 PID 4764 wrote to memory of 1592 4764 msedge.exe 83 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84 PID 4764 wrote to memory of 3596 4764 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7bde56ae34eeb0fe6db85c5b5e674adf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc634b46f8,0x7ffc634b4708,0x7ffc634b47182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8707527497753122268,15467423556640839039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
79KB
MD582de40c4e1d797dcc85f49c6fae57481
SHA1e3f5ab08aa9eb7cb732278e04d4e15034827c88b
SHA256e640cf46a52c4bdafe6047f89bfe5cb907180f50667ee133c9005a5b009097a1
SHA5124bbce4d0713e76afbc4c1f0b0fe2560505a21047bd1176b220d80ae29ec3c32967cc74b552167311b97087cb918701354719729e065ee4edbfa842e987def2a4
-
Filesize
1KB
MD5f54eb55fdd4225bb1a4e1f274b83821e
SHA1ec1b105576b6f77d5bd393f7fd8034c53c4107ff
SHA25638204a9c7e3b53cf92e0cf988d897702857b5f57ef7eb9059707f3ec73e1894f
SHA512ebf32b0d2d698fb0ab2148665aadb1dc0493cee69ed3f10d76be4bb399e6421455cc6d286576b5c7132ea3a78dff959da4beb8e02dc88aef5af5a719bfa64bbd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD58caa478c27e9fdfd22a4189aad94516b
SHA16764dc4257f666298e684fe135048384b375537a
SHA2568bf823cbfd7183ececebd389d277915f27cc981e1e29963364a75a5b5bdbe80d
SHA512773f00d7bcb368db349eca36d9497f86a6ac4963315f2969af7563597b6d7379ca9ad2124533bebdd2207fc4b0eac7faf2a50f9dd1ed5ee747d126bab93a8729
-
Filesize
6KB
MD596091e07e06371ed195de37d6201a71f
SHA139703853b173aec55182cbeec33ac85f97cb4a3f
SHA256fa5aa5dbe1c5a49df646b01b54638bad2f0b4d0f322baa2bfa99b58222cf76a7
SHA512df00362b48e005af231aafec60eb1fcdc91daf48994374c64a2a4a72f9ea7e76217e27b045a2a9ba18348b004342573542b05ec0da949781093d2c5e4e57c166
-
Filesize
6KB
MD52791d9d97b3fb48cf5fa116f64e7db44
SHA140a1acd2d9a3218cc9b72e73008052d769811991
SHA25663672db76694513e4a029fcea2273cc97adf4f3464b23e93e2457ebec359e84d
SHA51225ed7b95e0669258feaf168596daa02f3ae858c7c3861c23f53a55437c1eedc1c25386304add166e7b7a1460f65ad006a4b02dab8acf520edf060117db0642d8
-
Filesize
1KB
MD582733f920aa36105b832b5f22d1a9678
SHA1b8497b05f904611d074bd55f4482ab94fe80ccaa
SHA25695446617019da04c3f68613679725b3ad4d06b09f573ca1d9d8a30f64a7f8d8d
SHA512e8512681f8e1f6716037a1e17c9b5c04e68e92f278e473732bff8a55805e6ea2bebdb8ca9a88afc6ae6aef4f025a67d4f5c3b92663ea283dfce4848e4df64b4e
-
Filesize
707B
MD56dc7d5ed9b2007e3ec031b8103e848de
SHA1ac1fddc4e7e1d3fa42b406240450001195d38852
SHA256902533c8c2a83fb85e8397867c829066a1d47e8c0e2f03dcd118bd15d2e1fb4b
SHA512b945b7e61d8e5c5c7ef17dbd98755d7e649fb559171b0e8ebe894b1d06ee485d62fca1edf33641f1ee08643a724ba7c543f90f7bc37457ba038cd2d691f4687a
-
Filesize
10KB
MD549890a2521199cba7ae55234845e253d
SHA143374fbea71835ec26c307a1fae337da1ebcff65
SHA25648d8512d4fd904abb9b1cf46fdb90e9e55cdf5ae9ff5d93a72601bfd13f5bd78
SHA512b1aa00b18869655bd485be0e2df4e1e14518bfbbe2ba6a2b7ddf77562e7d03763826d3821ac68be9df14c919c804b54520adb6029a17b8f7659bbe20e1deccce