Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html
-
Size
19KB
-
MD5
7cb297a18dc70cbf4c7dfd1fcc02ebf1
-
SHA1
e1f786a5211632ce9130917876c5301ad170a7c6
-
SHA256
a84b7b04256e5e73f65370b9b30bda645dcc6e3087e3602af1da1e6d0cf41ace
-
SHA512
1915145ec778f55690bc010ff51739c6acc08be22de58672718c3b5a2ada40071509ed74bedfef6c2e152cdbc4a317df4116aaa03ec6edb4da453c35d6a48ab6
-
SSDEEP
192:uw7Wb5nOhnQjxn5Q/BnQieENn4nQOkEntbnnQTbnpnQmSgHMBkqnYnQ5VNnlnQVR:MQ/9qyLl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 2740 msedge.exe 2740 msedge.exe 4668 identity_helper.exe 4668 identity_helper.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1496 2740 msedge.exe 83 PID 2740 wrote to memory of 1496 2740 msedge.exe 83 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4320 2740 msedge.exe 84 PID 2740 wrote to memory of 4272 2740 msedge.exe 85 PID 2740 wrote to memory of 4272 2740 msedge.exe 85 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86 PID 2740 wrote to memory of 3764 2740 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7cb297a18dc70cbf4c7dfd1fcc02ebf1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed247182⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15321088617753739163,1199362579806383084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5fceda6afacf53072cb44008b634a67cb
SHA17832bc35a39a6cc003be8aa7f734f056652ca1a9
SHA25613a69e4f26c92edc33f24e25c7d4846782b26be0be83f187d197145106308ade
SHA51257df9a8dead5e52acf1aea9c6ded3f2da7a8e0fc714eb474b5d61261b035f273498f74963969730c0d3d0d330016718114d0caeaf0afdc62a4cfebf6af7e8f9c
-
Filesize
6KB
MD5778e7296d86803f9217061756da219ea
SHA10b347164eb60a47c8d93d279bb774c907e6aaf1d
SHA25695e78809bb1322f8a225cc58395bb71b57d2ee8e1ee13f79756e7a695dec01aa
SHA51267eb6de8d5aee91be4d8a9b0af7163f3dde12a20c2d51872bd9cb389bb0df5f0c2f2ba726f4ae20a6dfb45934ca257fe461965c00596c7797c59938165ceac2c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f08ef390-a4b8-472d-b92b-8abb9ff6be4e.tmp
Filesize5KB
MD57230e76ac0ec3ce8245c05ce8629eeef
SHA1867a9ff14ad31b6a3f887c22c50a2791d20f9615
SHA256c8437e4642c2c560c6aff6af3a68516ce2e2053acd08c82d0b4d8525f2388377
SHA51286cab8f37ae78e9070ecdd4737683c16b4d4c004b8c3919d9ed09697caf3794fd3194a8123be981cf168306cfc17b2a19ffce7958fc0a197f32e0a0c5c370706
-
Filesize
11KB
MD544acd8bd6dacb6dc4976b0c6eeaeac25
SHA1034e13d444ebcdcbc89113d131c63fa5c48ec0ef
SHA25697aaeb08e8aca94313e448a498a86197a531239280575f9e6d1a973a7c07453f
SHA512c62bd193c84f97d1421427f0233cfe8f875b5cc0656cfdee0874e9d64eb23c240c1dfe19a1dcaa6d51e0e74541b931839403d58148a00921438b3f4959c4b2ea