Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
7df5b88d0065bb373d1cf5f91d50fb8d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7df5b88d0065bb373d1cf5f91d50fb8d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7df5b88d0065bb373d1cf5f91d50fb8d_JaffaCakes118.html
-
Size
76KB
-
MD5
7df5b88d0065bb373d1cf5f91d50fb8d
-
SHA1
dd075568d271352203adf66eb974f7d370895855
-
SHA256
3b94482968b18e79b707e2ee06015eff0ef9b4fd98c58a3732467f5ca3e41295
-
SHA512
584a4db5f7e273c0165f5bc62b5a390a36283bd00de2c1d574eb74cd7011f5a320a35ca251c2b193461d46f54581bf74f9f63d6e7be759d87240405a824ed6a8
-
SSDEEP
768:/xzlpGtiZXBNLdJhOFbVxdBeV6t7VIdGpY2CLlqghFvBhRdnDpuA815vpkWxMpTM:F+ue9dMqghFDCke8W03GxjS2NFz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 220 msedge.exe 220 msedge.exe 1588 identity_helper.exe 1588 identity_helper.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 1072 220 msedge.exe 83 PID 220 wrote to memory of 1072 220 msedge.exe 83 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 84 PID 220 wrote to memory of 4552 220 msedge.exe 85 PID 220 wrote to memory of 4552 220 msedge.exe 85 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7df5b88d0065bb373d1cf5f91d50fb8d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12860245285692401598,16300215350800511069,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
192B
MD555f1137c61be064a95fe1ad2027cf48c
SHA1db80ca34477d09f76c9d67a747a85e7418804b6c
SHA256869b3a297efa0137be17558bb90e2e551e6c30cac15671c104e7c5a79b9f1913
SHA512b5ff0ba4476918e432621c37c5d8b60821ba715f6104cc68d6a20841ab66c9a6a6d806dc86b8cc77f59162069f83c58fde42f98cf7695c341d4e120136aa1afd
-
Filesize
5KB
MD564678d1dabc5f39e72a41545d5e7410a
SHA1f30d4c994a6108fae25b52de115b66e654a10cc2
SHA256e7db9b4a75f9537d5a00586145c44ed78f8569824d04fdd33de57acce4816f54
SHA512c50f508f1938b1cf77126e4186ebea0793bfb212d3411655225bd0ac7aa3c4a236c4fe6ad0a8488d092e3999323f744dd18375ae79981b6937844037d174d315
-
Filesize
6KB
MD5961675065f38c3d0f05c30b554c07081
SHA18375a3f9c1a54a469cb6a6b73bf688a978807d2f
SHA256348247d92f1881efd1b67833767d712172cc88f9d502f8998265cd63630a6b9b
SHA512c91172eb89ba8f04cbcd160c83d2f86cab2da7af6689fbdbbb6088fc5589b109edd2d23308b3f0802149f3dcf9462e67b3765faf6ddb8bc52998382d57f5aa27
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8fb2dd6af0d851f9c21a30032e85d73
SHA14067ba681805ffca8de84d9d1906c73c7be33f0c
SHA256cd40e0b413dd3475ddfce4ca59468ac11be84938a8981cd1289c784bfa44a579
SHA5122eb905847da0b6ba0906dc1b8ffd58fe9b9f901700aab46933b31b6fba59e7f68c5ef3c1e91c387f690f6c9ec8f2824103d72a57158c546344bd145afb285e59