Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
7bf8eb512787291b45cbb5c1627b35fe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7bf8eb512787291b45cbb5c1627b35fe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7bf8eb512787291b45cbb5c1627b35fe_JaffaCakes118.html
-
Size
55KB
-
MD5
7bf8eb512787291b45cbb5c1627b35fe
-
SHA1
30a642ae9aa82040e8a60d67d504bca596a380a1
-
SHA256
cd08f8844c83d1caf2beb9433533314d0efe0c24777a2fbb2bdff5f7162987e5
-
SHA512
ec82ccfafe496df8496be978d8a05ade283ae390f92647945444c2affef6c0f44653ade460622f5268b043029b6c2e09a0840181a5c198d9fd7dc21ab8f60e3b
-
SSDEEP
768:6LjpHvvCIooZZDBIBZeWFZUJU9nwZQDtvCwIxq7/DY6xFgV4:6xHv7omlBsZeWFZUJU9nwZQDtJrDY6B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 1780 msedge.exe 1780 msedge.exe 372 identity_helper.exe 372 identity_helper.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4504 1780 msedge.exe 82 PID 1780 wrote to memory of 4504 1780 msedge.exe 82 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 2292 1780 msedge.exe 83 PID 1780 wrote to memory of 3968 1780 msedge.exe 84 PID 1780 wrote to memory of 3968 1780 msedge.exe 84 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85 PID 1780 wrote to memory of 3104 1780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7bf8eb512787291b45cbb5c1627b35fe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e53746f8,0x7ff9e5374708,0x7ff9e53747182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16345211627189356046,16249449584519340818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD556f04b1a1566d22dd3d97f1baa0ba0e9
SHA13bba44654a1dd08396009f5145a012a3441c7f29
SHA25623e86791a6dcf1fb196d2467860d1a2ab9735bbe37b02def547e5d92842d5316
SHA51272044494957aa71017da29f55501bf6f1069d3ab1956ac5b9879c6a7054e8c13e398320493b1aadefb911a30a9442cdd0119264a6fb224bc8501ead472275eb0
-
Filesize
1KB
MD590ceb16c8b7d072a8f592c5aa058296c
SHA1dedd1497871721437385b5f8cb75d1f8be160417
SHA256d2d92e8c059ed288fd1b3d2ab1b4eedffef2e3b37f551713bbbcab14933eab23
SHA512641c9ca9466056b07ac7994ead1c42a72bdb543b3fc71439f11cf33fbfdc45f3661df5373c8df6f107eb44103c7fe441a99426c62c4b73c154b7645e55356f70
-
Filesize
5KB
MD57725aa2c8a654a7d19f091f380ec9a8a
SHA1e524008c072049a96735e792fb4dba9b96bb6baa
SHA2560487abd4c330170e3218814b5dccb6848b1bf19a5cacc4f57c285e15df3e5e1e
SHA512140603cb830720d5cfae545d13b6eb3cb70dd029b905f2b5f6a0d9e843daf7c995e62c93198e10ac464cf88f55f705f98cdc5dd3f54fde66c3b54aef9f6645a3
-
Filesize
6KB
MD5aa902e56425a8b081bc253846a7960e1
SHA13c7c9f77967ec5f54a858cb9a123df586ddfaee1
SHA25699bbf951e124da1e1ecc95358cb39b04c205822aa79487e23686bfe2af69a156
SHA512a25d3c6bbf99acf961d58c02d434fcb0b68e12e16eddb6999ba666e4220a4963b09077ad738e3bdbe7485f0805e1961dd00dfa1e651dd2df4891e3faae9d836d
-
Filesize
6KB
MD5e5d8dbfd71c87aba6724db86d32f3f28
SHA1ecde1d6916a1b281b7a8c66484cc0d7ab70755f3
SHA256c2c28f3afe655db7698472db2c4bbd5e7b14c7110fdc2f237345dddc68e799b4
SHA512bef3394a32fcf2c2a85f1221832f909da08642bb46d342b0c6038669145bb3c4744e33f226631e63a2b5635b79ef30e3e2b352d8e098a3b9380959add8312c46
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5564636944a1ecbde4df8486521ff401a
SHA19db334e88e441c04e68f982e66153f6460e65c83
SHA256b7b73967143de54780975cf2c0742e47c0d5bf6033d87e18adce253dffc7cc0f
SHA5126ded0ebb27ba03e9d6b133da27da64163cb3c59388a044d6c972bd767218ed8bfa5c6c6610fbc89470b3e8d7f852f06611d996ef1376b468c083b089f0756eea