Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
7c0ffc9a142b823dd29e32ebb75cccd9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c0ffc9a142b823dd29e32ebb75cccd9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c0ffc9a142b823dd29e32ebb75cccd9_JaffaCakes118.html
-
Size
19KB
-
MD5
7c0ffc9a142b823dd29e32ebb75cccd9
-
SHA1
12f966630d0e5c4b27e67eeb04eca138539d9c3d
-
SHA256
7a052c4c2c3238d2fd37e14b2e0aca517e945afe4799d3dfa2f4c0b94b66f9b6
-
SHA512
9432f48b396ea42144d1ffd4a853ebb4f800a12264e405818ddd6a5e34131a8d4af56ddeb99d99168d421fc2c79f5cfe37d03cd7319311813542ba2e8965dcb3
-
SSDEEP
384:SV6Z9Rjx1E6E2lTuKNXxzKzGKs8+P3KxKK6WbKoHgvYOCsRkVF91SC+8AOn6cNBN:vZ8elnx0fJ9QYn9HDExwcG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 2272 msedge.exe 2272 msedge.exe 1324 identity_helper.exe 1324 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2372 2272 msedge.exe 83 PID 2272 wrote to memory of 2372 2272 msedge.exe 83 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 3372 2272 msedge.exe 84 PID 2272 wrote to memory of 1092 2272 msedge.exe 85 PID 2272 wrote to memory of 1092 2272 msedge.exe 85 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86 PID 2272 wrote to memory of 1392 2272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c0ffc9a142b823dd29e32ebb75cccd9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9428a46f8,0x7ff9428a4708,0x7ff9428a47182⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8018118759659779816,2651451459768053939,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD504746df5ee5f261aa31ecfda4ba4c129
SHA154d4076f4c2275d4999b439b0b884112cc89f84f
SHA2561690e21221df8d3ce640ec14f7a8856c5d1235766fbd8c01da7bcbcad0142b85
SHA5122d2937fc48cb4a265eee3589bc60b9bc98bafd342ea4f5afa01afb9c47bb8d008303b66a610bc7a5c649feb3af9808eee7daea82bf4e52071294fecbaecdd785
-
Filesize
6KB
MD54a8f6f6d79fd38d3d5655002b0761885
SHA112ad168837a0912d7aeb61b48cfa44793686c3ff
SHA2563c5a236bd3a50b1269a36fa2c9c725e70ee7f8aa07651ef91868e0633b12183a
SHA512db7f293671b4be2c41d3586d05943aa39f534f75d98c7959e44ebff63258d469035bef9544c1ffb739bcaca519c60c24c95b1ad4a5b32bc475992f6d7e9f5f0e
-
Filesize
6KB
MD5405ae26a3a139a6606c4821cb6804c7a
SHA173de1106927f2ac6496025a045a7d1402b048c3a
SHA2566aacd175f39b7a35fce6e32c79a58feb27abc0549c52a26c6cdb583b8d9eda9b
SHA512171b2e4e57c5cb9038506ff6d7a235c434f5d69b6c34c1bbb7e5bbf3ba0ff8177a05b56ecbe6cb573b2cea4ed5a16d246920de20fda358d05f9f7fae603085b6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD52eaae3bdedeccf32ff0520fa04f9402f
SHA161a9b6bfd64485c19c449a20e59135ce34d104bf
SHA25668142877d1fb48751e525c8345da8b17b6e6a62756c78ecf7aaf819f5781c272
SHA5122a6e21243f574f59c70849f03782732e30b1ad2c3abbe672599cafc90c6267055df7609260792457b404d5283f7f4d1d6ab51d416b81d6a0eeeb393ed7ab0eda