Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
7e1bd6e1dbd19e0de92a1e741f793bc2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e1bd6e1dbd19e0de92a1e741f793bc2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e1bd6e1dbd19e0de92a1e741f793bc2_JaffaCakes118.html
-
Size
170KB
-
MD5
7e1bd6e1dbd19e0de92a1e741f793bc2
-
SHA1
6fd6d8fccc3544f991415a8f7af3ea562a749595
-
SHA256
b79f4e821e0fa4a837f49fba0cb2238922f5658fe5e5ec82ea33c3aa634e8cb8
-
SHA512
76487cadcc509a115971971c90c2649c83f8089c19dbaf6044d7227b9bcba4ca19060076e50c8aaf64a3a03acca709b38949d6108f4b6255a0ab104b85fe8a6b
-
SSDEEP
3072:YPC9qGgFcg3Qy9VK5E4zj4p0kN/413nzhUV:YK9quy9VK5P4p0ip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 2640 msedge.exe 2640 msedge.exe 652 identity_helper.exe 652 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2640 wrote to memory of 548 2640 msedge.exe 83 PID 2640 wrote to memory of 548 2640 msedge.exe 83 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 3652 2640 msedge.exe 84 PID 2640 wrote to memory of 4992 2640 msedge.exe 85 PID 2640 wrote to memory of 4992 2640 msedge.exe 85 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86 PID 2640 wrote to memory of 3588 2640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7e1bd6e1dbd19e0de92a1e741f793bc2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff1fe446f8,0x7fff1fe44708,0x7fff1fe447182⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17498606572864848235,1617932410472924307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3480 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
573B
MD59a97e4241f087772ab98e0d7f0891a88
SHA12807efbe8b689ed46590a1e068356ba3b13021c3
SHA256e9184f9700f8077724292e9e3865b35a64ec219bbf686c448a968d79bfdb592e
SHA5123bed639e327f6be41f4df199a83367fb5c74435ae57753bf0777860f1b6e1b01099d6f6f1703648e864cfb7d397588a46ae0f17f821fc6f02e125af22f698366
-
Filesize
5KB
MD52eecac2d6787b51a8f0e6a123ea41840
SHA166a6c6beae5dba135744c5cf7ca592aaf590ff05
SHA2567ac68e7d60dc3ff7fceba1a24405a7647cd3f2832f8af50138c2d9aae77fe07a
SHA5125722f1cdb9e460c7c5c365415c72e3678df7e611726a659f51972817ab7c663ad3f482ce9db9893c28bf2f357110fd910ad70439bda3ac71bd875a2b5d113f2b
-
Filesize
6KB
MD5ab49569d27ba0a8601a336e82175b80e
SHA19215e40ad409757d554cadaaa4bda5e5c1ba715a
SHA256e5aa5806129d3f8a2db66c9135edbc43fd9d0b6a5caf575e1f08a589ba22ece8
SHA512bbbf2bde145d815c87079da4f2446a951c2ed22b4cee625a44965468b80ee83b0fe6df68587ee1a2a3912ba0cfe29788dd4169459724cfc4be56dace197b72a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f20ab67f2bedb066cb45970ee154c74e
SHA1b855e270123dbd2bb358549c94148c0320738141
SHA25662ce43bd62a460e8122bce4c3f0f3bba421a3a386f0a701c55d15521581fda56
SHA512ba12bdefd6910cc8a77a2f376052f75a7f08f06b0b68a6a30e2a208f580b3cddb90dd6fdcf9ef5be201a2a2b1450e6be2fe4b0e7669c7185f1429c52e1854f87