Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
7cc1df903988f33a064708b61639d0a0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7cc1df903988f33a064708b61639d0a0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7cc1df903988f33a064708b61639d0a0_JaffaCakes118.html
-
Size
5.1MB
-
MD5
7cc1df903988f33a064708b61639d0a0
-
SHA1
70017d7d3e857678476038d8168755a7ac047874
-
SHA256
58cd1e4dd6361ef373bc885f9a11ec137a3044f88be8c4f7b4345ddaeab74260
-
SHA512
8e3e0ca7a4e341808c1e2a8918a41838f2228a3decfa68f991036af18f130e18410cbd5b8a3ec119e929c10700dd74c3a4fff6b5dbfbf31343c45dd8907b2349
-
SSDEEP
6144:uYRa1f4TWwv6phzx43X9bnrpfd2KPW+Vkb+R:lRPSxy8yR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 4568 msedge.exe 4568 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4052 4568 msedge.exe 83 PID 4568 wrote to memory of 4052 4568 msedge.exe 83 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3812 4568 msedge.exe 84 PID 4568 wrote to memory of 3144 4568 msedge.exe 85 PID 4568 wrote to memory of 3144 4568 msedge.exe 85 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86 PID 4568 wrote to memory of 4208 4568 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7cc1df903988f33a064708b61639d0a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffa4a9b46f8,0x7ffa4a9b4708,0x7ffa4a9b47182⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,7809869032688384432,14557394733657758683,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD527d81d7b07c5b7b003e9ba838c3af22e
SHA1b699049d9148c4a7ba871eaf2f74d403303e077d
SHA2564774882c222613f9db19be86c4023dc69b44837493de8f895da24e40d4df0c14
SHA5121376d73cb3e90324890b0bf626042034cd86e51e3aa8f5396c7a3d06a5e317c279606f961924695d4980dc861102fe38050d279b7819974c8c9908fea088c524
-
Filesize
6KB
MD500cdb20e7a6e2414bbbe73eef2500d72
SHA164e53c7a4899b5e6be4ce15405e71539feb91ab9
SHA2563c2536bed134760642b118a5650de035c86c995f6e6f0d7ee3617331e3cd20f4
SHA5123709833f7d2e8683138815d85620f98362ea6da6fb8f28c92f40386579fc87c25a92fc31eff6b9510a7b3066d3e7344d30c286bf888ed620fd819fb095f76915
-
Filesize
6KB
MD5118690bc3302cb4bca8c0f158f8a8a13
SHA1982843d626aa97605e0a68a618a9f33eec20c637
SHA256aad48c14381debd1cf8095f65079ea2eab71e59830990d5f8fab66e47372fed8
SHA512542ed2cae69dc3499dda49e4acae8ed2319a7fd012149c9ca2c19310bd8d1b8d383ecb10a3236082dade1b87b6857489e9c03c287016d8a2e16cec6b036249c4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD529b061a3a832a0f76b90c983a38ec848
SHA18084cbf2babac12897b164e51545ee16eeae96a2
SHA25633696e34bb85d7f02674129c51a5ab0f62588e0798f139d3f761daa6033b3d10
SHA512316ed952565d407839998c1de8a766a44812153894bb371e181bf157506e58a6ea121cb56896a62ee69137460f85362ca004dd6a82f523b0ea553e137cab02a1