Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
7c464e276c935555559c175a5d34980f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7c464e276c935555559c175a5d34980f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c464e276c935555559c175a5d34980f_JaffaCakes118.html
-
Size
70KB
-
MD5
7c464e276c935555559c175a5d34980f
-
SHA1
36adf54e7af4a52a0791331544f498b472814eb8
-
SHA256
830aed4c486cb9f2d14e582cfa3862351315087f4b912f6666bf6f80634f8809
-
SHA512
cbf2978eaf42f89b0bbe3f5d6bef4bd145b99355d7875eff075d7bdccecf327189b4559210c518b3277d757dc1afdc337bb23ac7da861ef35d830bf668e4bd44
-
SSDEEP
1536:tCC+yfE+dPSFtPb07ZiIsjFbcgNBlh+W45xXlrCvknwzxdUXZl+TnNSFpM8pcpjQ:JSJ9Ar3J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2840 msedge.exe 2840 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4524 2840 msedge.exe 83 PID 2840 wrote to memory of 4524 2840 msedge.exe 83 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 5020 2840 msedge.exe 84 PID 2840 wrote to memory of 2940 2840 msedge.exe 85 PID 2840 wrote to memory of 2940 2840 msedge.exe 85 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86 PID 2840 wrote to memory of 1168 2840 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c464e276c935555559c175a5d34980f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84ef46f8,0x7ffa84ef4708,0x7ffa84ef47182⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9968976179328077929,10968305561628380341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1KB
MD553df2de5d4f0e12a3b1b345c14a6b7de
SHA18b28988fc40a64f370afd9b661b3fea5f4d257b1
SHA2561b8c05a6a66048eea56540e3e3cc2accfdc59c06fe1f4578ec3038589d3303a5
SHA51282a5f7b5c3e5f4c17840caf05b9a6054c65bcb632f823df11cb7c3740b314ed1a2668dd02d74c0f19ff2f7935c9cd424745b5ab07485433ee191abfeb8cb4eca
-
Filesize
5KB
MD5940340e72fc3cd191d1b29057098b9c0
SHA1ac1c8788c471d86d64a67f66d89cf11411b11870
SHA256a03a5c0239ba87e47d948ddea27fde001de17afe6b7872daf08627b4a6f368c4
SHA5121dd27b4fb6634038e0e24cb864913a3b6cab4ec62d6cfad9fd2029941b49bdbc34ae0199845b9d5b4d6d2136ff6dc53df11ff0e14b9961647eb9d3c9bff77e41
-
Filesize
7KB
MD54893065f1ab5b30dbdf87e1d61a9c0c4
SHA1b23562176b5f85e4b5a969cc9975f95943b2e1ec
SHA2569b982050e7bb84ca1ded1e9726e1482d3c8916cd48e3abf6e428ce2f3e46dcee
SHA512eb27c12e536b911e73750fd2d2db70da66e61c633883768847e2b3ca3dcc752e88f27114ee160d351502dc175df278f12a925ac1c3bf15a2906a857a033657a3
-
Filesize
6KB
MD53149f8f98c5ae6f0f5090faff000474b
SHA150f1ea8dcd0e7c4f09c880008ecc1c98db8e0013
SHA25624ef16cc3be753af28cbea81e3663734be9940b7a38efc24e9de0f66e8bf92f0
SHA512b46b6012b43b7c2440d848a0492e0fa583677feb9102a929f7aa7761bf3eab77e983d55891d449203563cfa9f2d0be5d77642e2a3aa408420261c01379498975
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56968706a72b8fb9fdc61f6d73959838d
SHA1b58437b3f3caf579259a46a1717643f5418ff126
SHA25601e60dec9749af812102ba8c1322ff951905f5d037e15d4466362078cc66d6e7
SHA512c2e45e056de3c0e8a7fa9208ed8e18d379d39c45518d49458b6b7ae3170e2e5d148381ce5eb7213b5a6091b46acdddbc4e89c20fa53a560a88334e63ad00072c