Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
7f0211daac1ebd59220b49995347d88b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7f0211daac1ebd59220b49995347d88b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f0211daac1ebd59220b49995347d88b_JaffaCakes118.html
-
Size
36KB
-
MD5
7f0211daac1ebd59220b49995347d88b
-
SHA1
9713dcf16f78d39aa5bee2013e7c07085da4364f
-
SHA256
15716ef7a5f51bce0861acb5b7142b11aa49b30f0c52a22e32b6d0d41be2ca6c
-
SHA512
16c2ed060a51431f3560194b6d25345110bc79c83492e0accdfed314733e9c419213ba23c16a7a0b05e48d512e3c414c227312a995b8a40f886c0e59fb3c8f67
-
SSDEEP
768:zwx/MDTHnf88hARWgZPXYZE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lX:Q/uNsbJxNVNufSM/P80K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 4572 msedge.exe 4572 msedge.exe 3180 identity_helper.exe 3180 identity_helper.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4252 4572 msedge.exe 81 PID 4572 wrote to memory of 4252 4572 msedge.exe 81 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 3696 4572 msedge.exe 82 PID 4572 wrote to memory of 2032 4572 msedge.exe 83 PID 4572 wrote to memory of 2032 4572 msedge.exe 83 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84 PID 4572 wrote to memory of 3432 4572 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f0211daac1ebd59220b49995347d88b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac3746f8,0x7ffbac374708,0x7ffbac3747182⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1541782107906078065,5122129904528871193,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
613B
MD5a26b9e80f72ce58342cb956a85dd4b4d
SHA1e262b99124710e62389066ce25573010316681fd
SHA256e067751ced890e29a9ee7cf17c8066d3b24c31dde6e7cf96397957080c058314
SHA5125a24a28ca8af70d4fb31af159017776b23c55a3e1e3907060f4392bb6b5aacdf2fbe5619549d72c75ba54e42c05b44508e19cd737fa5f6053b7f57c207d95910
-
Filesize
5KB
MD52ec7897710ded1c9a106f3deea44a0d3
SHA1f7ab43e12b6a0dab80803671ed4e3d1a61e5b0cb
SHA25656f7c5f4e72f1aa2da720f0c58c333fb67a87d2fd60340ffaadae39f0fc2406f
SHA5123f996a0bc45edcd278f46a5fdd4980c1d1afe9ebb2cdd934d7dc10a6cceb4336e47e7c6cc2613f493585855a2b0381c32b8a65bf0fcb876cd5a07a5364ae7665
-
Filesize
6KB
MD5dc2c5410cb328a0f55631eb1d6acf51d
SHA1d4c83a6b8f0685aaac5c9d58a3ba910ba027861e
SHA25659ecefd89c1add102e16298d3d3adb79e7e01c34b9703ac877a116222172ec19
SHA5129384170d67d8d268dd3c4e25b1ea5758f4ce90c2fe3eba238b9032b250d5bc587bed472cdd7fc159d562ae1eaf331a03369d44338d0bf1f5d5d0460ce2d189d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD596aab6c075b226d1effd383be115fa7c
SHA1020d7557c38f9bb72b316396c9b439c381164e2b
SHA256538437598b1de815d36a6219fb57290e039fd83fcbd4af741a9c4ec44df7ce0a
SHA5128bf62b0096687e60e3850148f899e77c5bf14a3bac25654df0bda81cd399876115df271c7a0472e98a02b3116392a161995ac04aaeefe9eda84855a197f7524c