Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
7d0a0c86f2bef14b18b164f853de3a71_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7d0a0c86f2bef14b18b164f853de3a71_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d0a0c86f2bef14b18b164f853de3a71_JaffaCakes118.html
-
Size
201KB
-
MD5
7d0a0c86f2bef14b18b164f853de3a71
-
SHA1
1e36a7c0140a7fe75103fc65effea920aa3c0ee0
-
SHA256
34208d0b8f75e6d316fca7ddd40016e1afbb7db93f119f4ef209787de99d82ce
-
SHA512
5c7570a2aa2bca2e9c1d5bea9ff2dab8a5c2611038cb66fdc3163be2896ddb9711df4818a768c4baf5fbf8b58d52dbcc68ba4a3830132eaf18833f27e13f6b20
-
SSDEEP
1536:kaeijo7S3rlHnB+fVANxUxfXMYOW8h8COOBbq/wLClRGvM:deXfXezu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 3792 msedge.exe 3792 msedge.exe 1464 identity_helper.exe 1464 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 2160 3792 msedge.exe 83 PID 3792 wrote to memory of 2160 3792 msedge.exe 83 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3012 3792 msedge.exe 84 PID 3792 wrote to memory of 3000 3792 msedge.exe 85 PID 3792 wrote to memory of 3000 3792 msedge.exe 85 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86 PID 3792 wrote to memory of 4172 3792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d0a0c86f2bef14b18b164f853de3a71_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd952e46f8,0x7ffd952e4708,0x7ffd952e47182⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10885828212696190141,1931844331933221835,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD5909c221719119ed56282905d59cabdc4
SHA1b109d9f45040cbb6957123b1900eed57cacc0acf
SHA2560922087508c01341e298cc0ab9cdb5610b936fa6c40b8157eeb5c1b680329177
SHA512387455b086e56dff4da52c21591a8015dde7604066721dad08089735edc004b8f366b51d5372d91eaf375297b93cc5358c9e9d167daad7ce25440c1aaeaff21f
-
Filesize
6KB
MD5abe2e321e7505cf523c2476985641441
SHA12fd0db61a5766ded7048e362727dbb8aadfe27e8
SHA2564b5051eab9580b72f38dbf67edd746a1fd4c8259b4829e695ce17ccf5826869f
SHA512aaaf7bbb87f36aa87b344e3c3ac04e20e60cfec2e7fd0ac8b91333cc86bbeb028cd737df84d43b97c5c81a8fb4b3e18c23a4d3c821bf69418d906b568f73e2cb
-
Filesize
6KB
MD5d76ae7b68b504a1e7a5c2a1f0ce52d35
SHA1b6f3eae925df015cc1634c753ae727ae0093ae0c
SHA2569c24c66b7825e641a1df9d3e51fa545a5b8f26168516a5eb8120d8ceb30fd354
SHA512353c13e40a60b3490064c8473fff4a812cb57f7f18a02644d1a22111ec845e64d69ab0fc260f5680065dc30038bdc36315459343eac3f55bdcb34a78b31195c0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a79c074c214302651a16c61780883ef0
SHA1cfa1a460eab69c1d6dbb1ff2c0ed076c7a1e064e
SHA256507f5e062e5d8885e10530d0229f2a8f5328d5982ed308c2abcc22bdb92e0049
SHA512953bbd967942627400993f2b00e419a4a8bc92200ac739f172652a5b69116f91bdac0f78cf4aa8f3f4b4f680342a803b35ca7f7f1b2b0ea98f54597eba282b66