Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
7d01136a72a31229a3c7d94838664c20_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d01136a72a31229a3c7d94838664c20_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d01136a72a31229a3c7d94838664c20_JaffaCakes118.html
-
Size
134KB
-
MD5
7d01136a72a31229a3c7d94838664c20
-
SHA1
4f58d546f404d773cd4f7bb37f2b58c07423bb12
-
SHA256
cf9bd2f72f319d4ff83e8a74ab0940b88af16f62e9614b90d05e9e0b7e8fa81c
-
SHA512
610bca185b5b1e7ab425326ed42986f262fc81a190a56baebc279595d003075b1d97f2cdc8b5c48317ed98f6e64d72550b8adfb2e2702fcd80ad5a526006696f
-
SSDEEP
3072:ShctjQkRAqI1Yb+w3Y9ZynQkZqhMjmy314dniTRuYZU1X/x/:ShJqI1Yb+w3Y9ZynQkZqhMjmy314dniY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 2240 msedge.exe 2240 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4788 2240 msedge.exe 81 PID 2240 wrote to memory of 4788 2240 msedge.exe 81 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3464 2240 msedge.exe 82 PID 2240 wrote to memory of 3076 2240 msedge.exe 83 PID 2240 wrote to memory of 3076 2240 msedge.exe 83 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84 PID 2240 wrote to memory of 1164 2240 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d01136a72a31229a3c7d94838664c20_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe41846f8,0x7fffe4184708,0x7fffe41847182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17756329031839673864,7270602346809740472,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\814f7c30-59fa-406c-be8b-4d32c1c4b99d.tmp
Filesize2KB
MD5862587806c1a355de036cf650779a2e0
SHA1c972761182059ef2336f1547fb8d4334277cc51e
SHA2561903e159afcf1578ed03b6a4685c9ec17096f389f57940c6f4712f07e4d2e0cb
SHA5120455d6a881bf019bddca864cd0d6fe015ebb06133cd0ab6bc58d311a4011f4dde9d4ba87b2e5bdc6b874dab81327711f70c912213f4f8f89e25ca1525752c1d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5446625479bfbd6cbb363697399556c90
SHA176b81959e688a15d18865e8a937f0f7193e792a8
SHA256af9ad214b02766cf249c31ed1c1bbf01b1c93a907e8c63810d66a64ddc3313fd
SHA512ec045e74c57f0531d1592306eecc69152a189bd0dc7d603f6d27a098779835a4f176419cfca2914b1a5bef11a22720246246381b1838f96b8c544e0eeec963dc
-
Filesize
2KB
MD5bede0db9b0ccd738870ce55a49681c41
SHA16d594541e26da3420e650694a8f5cb73910e08b5
SHA256b3c236355dc867ec2a006cfb364bcc4d898e83a363fa752449b42a4abab8ec70
SHA5126f22e09765816b67d50aaaa382848472c3434beaf1824335229effbd81639e21359e972078268baa227f5e617680af010c580884ebaa10483e0e1c74859463fb
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5b1092c68b0e5402975f8e4165a37bb6d
SHA16b7f4d5c241c013f645ab4b73dfc00af8d349f27
SHA256eb7aa96dd40c7f5dcf6a5771e6b7ce735b71fc1bb922afbff44a4769552193f7
SHA5124450f4a8472b6d0dc6909bc7c5434db1b66a87c0fa9197d21f3e53cac31aefa20c6d41938d70fc683233a9c6cfe847a71836e2ad0eae5d4553ab22652e2efb60
-
Filesize
6KB
MD5257a6286c3512222b51275469cc769a1
SHA12fe115159eee092474376eda9fd34257e36d08e8
SHA2568bba89ccb57300854428be6ee96071e84780d4592f090d82caf52801f5b374ae
SHA512d7101c7d22507de9bbba75fb727ac46c6796eeda1c5a1979211efa4b7e39fc26c22a52c465464a48841f5103c64b32f91943f8029e5a2966884be2387f23d7e3
-
Filesize
10KB
MD571e5dfe8031afd208eb63e1e5af8a0f8
SHA1f6c28b9d9d0c63610cd76003a1a9e3f9a6648837
SHA256b46464724f0ba77fe0f338644e2f95f9b9bd20ed250ce6060f4ab3ba1f6ab80f
SHA512d9ea6d3478ea93bd9d2b8b09b2e360de1b04cd07c0f8edd5c3e672a7c94277c66756eb4ef4633cc464bb4c7f5f60504b3baad89bfb2679d2bc6242ab41db8335