Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
7c720fe7ac7c97a977d4d64c28681556_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7c720fe7ac7c97a977d4d64c28681556_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7c720fe7ac7c97a977d4d64c28681556_JaffaCakes118.html
-
Size
292KB
-
MD5
7c720fe7ac7c97a977d4d64c28681556
-
SHA1
e3200812d1512bc734bcaae29237ec2e649345ba
-
SHA256
4a810dd59ebe11998fd8c2ed87b9e74961199bb5e98441ebeb910f0084ba845d
-
SHA512
4e0f3f869197feb96a774acf9a0e21e62b050f18ee3e199949c5a879c036f2c06372342313c694a7881c84881e7470e98d70a78df8662a014505c5264bd3c2aa
-
SSDEEP
3072:PpgIyfkMY+BES09JXAnyrZalI+YfhxcVhiCVcejF1Yusd2t8bHum:hgFsMYod+X3oI+YfrscehyusdHX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 748 msedge.exe 748 msedge.exe 3792 msedge.exe 3792 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 4912 3792 msedge.exe 81 PID 3792 wrote to memory of 4912 3792 msedge.exe 81 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 3508 3792 msedge.exe 82 PID 3792 wrote to memory of 748 3792 msedge.exe 83 PID 3792 wrote to memory of 748 3792 msedge.exe 83 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84 PID 3792 wrote to memory of 668 3792 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c720fe7ac7c97a977d4d64c28681556_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffaecb46f8,0x7fffaecb4708,0x7fffaecb47182⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9244508986610472422,7095951111289096961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9244508986610472422,7095951111289096961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9244508986610472422,7095951111289096961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9244508986610472422,7095951111289096961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9244508986610472422,7095951111289096961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9244508986610472422,7095951111289096961,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5487f62227c07d90e7e1b0b0abc2f0f0c
SHA1ac9def70c74d1838194e0a81a2c128e6669d856e
SHA25640f69d08e3f18df91590101f353d774e9b2f11e6bd0d1f10bdbec29ff474a9e2
SHA512591c0affd92f7005ee88c4855f773a6f66d056693a14af1b4961bd22b61cb98c2b3262f5224babd96e8dcce2eec6fb6e0e557e1f65a748b24919a205606bf66f
-
Filesize
6KB
MD58824b2caa7172a624e586380bc904a92
SHA119c95baa83c93e248b27967cc219c80b3e2c546e
SHA25696c90ceb460bd2f1daa33c79a9df5e0a2ad958acad37361cc13febcda89ee076
SHA512c8ebe4165ca4b3cf6f18fe1c91676d9fa6988586b07dc3658961d62b9997362c580af26f5ec15a8223d3808c818481ff3317d1045c19e8483db0911c486766e2
-
Filesize
6KB
MD5b7edbef200198046bbd292ac569ee260
SHA1d4deaeca6d86301b7e476b555c225d14db774847
SHA256a9cf906be647c79925df285bb75749a64440db02652f0ee6635ec5d7a4d3fb98
SHA5122455d29d2b7d47ede373f3966270fb7ad9cf00cdcbe6d1b0f3bf8e21161ff6e4060df0d466213f992487c5138106f6ec0921d111a6514fc39274631122f29404
-
Filesize
10KB
MD558be258ae90c1358e94f7437187a26b2
SHA1ce3637923ed7a178bf6688363c9cb9982c3cff7e
SHA256293ed89b9ad1f486b0cb7742772e05c1e80f6759bec08dd7303b1a75cba64535
SHA51242c0c8fdc8cd2e893d9aa6a601a05baf72d84794e25232039db98e917733f0d1465135d3843ed761b192d6389e818a9ec6435ba838635561c1d2b9002fac6418