Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
7f0457198380d5429b3ce7292098b024_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f0457198380d5429b3ce7292098b024_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f0457198380d5429b3ce7292098b024_JaffaCakes118.html
-
Size
25KB
-
MD5
7f0457198380d5429b3ce7292098b024
-
SHA1
729031870a20395d985327d62045faffd78e3709
-
SHA256
134508cec91cf46c5b20e03e0047e0e78eae3f50d01b4be2da67bd80a13d09e8
-
SHA512
262a56f4fee4e284cb85c3a25ea11a79850f32b772694b66765e3e19060f295711c41cfeef4dd675a1eae31357d4123e99c709b71114b7979a8070b438b2fc42
-
SSDEEP
384:q8FUu3gOlb+1rr7cHOscIiK/YPOEVnKyvCyG0l8jjVi9i/:q8FUGgu+1rr9scY/YjVttG5jN/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 3968 msedge.exe 3968 msedge.exe 460 identity_helper.exe 460 identity_helper.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 5032 3968 msedge.exe 82 PID 3968 wrote to memory of 5032 3968 msedge.exe 82 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 1652 3968 msedge.exe 85 PID 3968 wrote to memory of 4584 3968 msedge.exe 86 PID 3968 wrote to memory of 4584 3968 msedge.exe 86 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87 PID 3968 wrote to memory of 1804 3968 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f0457198380d5429b3ce7292098b024_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee5d646f8,0x7ffee5d64708,0x7ffee5d647182⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14899654413844894899,11359305072793320222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
686B
MD598197cea3b006c8445e9700c76c91e87
SHA19bf005a87ee5a88875b538d3d36349e1e36fd00a
SHA2568ec13ecc3fa62008a827bcb95b6802c72e98f284169d43324a7f21d58af26661
SHA5124cf12b21747e121be83074470ef32b86e992f1d215b6dfac47b399c18c0be2effc8692a48da07befc8b02b2106273c6a3f38089c4f1a06d9fd51b12f1d71ff44
-
Filesize
5KB
MD58002ae3567d0ffffbda43249505463ef
SHA17e964479fedc3782170c93cbc4102a4c3f786079
SHA2564222d89031feb6d5db9711f4eb8daa4511e3d9276effe7b1e2b3ef979a42c802
SHA51287f9e9daada8b5ab2d4eeb2f3d19262ba886fd6218c60812897266ef02cb26035160abe452c9698b85ceb9f8c7d63ff65e295c487a734a9c627003100d7061e3
-
Filesize
6KB
MD58f211701061a496a940eead54054f630
SHA158ebd7e62f0804d3a525b54f340f81c9fe5c86a4
SHA25687f7c552494d7191df3af6c04eff86299e6e95cef7a55e9896318c192cc950e1
SHA5120c5649afd0566a45b0490b1f6aedcedd969ae42d919ed78768b089281febf85b4bad6898ae7c8efd580289ddda57c7e132b282e03441a4df741827402b1c3dfd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f453208284c00e20d12b761320c4ec29
SHA10d6b0db9b8b4c859da7fc22492605724460ca51f
SHA256128ec139f5812ef96ff17b1935d1ddb9996ad2ff630d5b8efcc880ee20a3d469
SHA512f986926077e233e405ce2ca883973f4ca5aecc17a65419729edb4dc222c7c9c86c04194caaf48b96764177d5a280382da006f29be4a2fcbf9e59e4538d4ce4e0