Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
7f5e8070a18df645777ede93680f3d07_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7f5e8070a18df645777ede93680f3d07_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f5e8070a18df645777ede93680f3d07_JaffaCakes118.html
-
Size
352KB
-
MD5
7f5e8070a18df645777ede93680f3d07
-
SHA1
66a8e91f3537533aa9727209cb599128a53454dd
-
SHA256
b37a50f55c37f32734514395269cb976551fd7251de6b8e70df0a532a0f717a8
-
SHA512
07242a69ee622190dc597512d9b527ce1a763fad65c8d62af962e0081c00ace040bb6e06fbeb818e826699f1ca474722e8d1b66ee8aa8acf4ee4832489d2d83e
-
SSDEEP
6144:SjbxMvIlh+2FM0Sex+JyZsMYod+X3oI+YRGDe1sMYod+X3oI+YRGDev:ebxMvIlh+2FM0Sex+Jyl5d+X3vGDG5d2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5064 msedge.exe 5064 msedge.exe 3512 msedge.exe 3512 msedge.exe 2140 identity_helper.exe 2140 identity_helper.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3512 wrote to memory of 1612 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 1612 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 2420 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 5064 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 5064 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe PID 3512 wrote to memory of 3388 3512 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f5e8070a18df645777ede93680f3d07_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4a9b46f8,0x7ffa4a9b4708,0x7ffa4a9b47182⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2226526719215457255,1689603550307250573,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD537ad70fb78268aeb4bb328fd79f96cfc
SHA1479031c45a3ea2450123211eb246a07c89603c14
SHA25665e84ab2a48c8df011fa2d073dbd6a75d6bef64b8d273ba1ff603c5fca4be35e
SHA5125317e790f9600ed9eaf5de008180cd5b71c2b5ad97a242145b035cd8562943906e20877fb9c5ce05e4297be2ad41ff8568b69bcbb08b30ff6eabc161df37201c
-
Filesize
6KB
MD5feaac55ce3543d87604bb046025afb49
SHA1742276f0454e5eaca059f6fe51a00369cf167414
SHA256ff7d897744c63a272c8de9bad8be2563a5027b0295c8b6642d58bf61add9b96f
SHA51276b62d3e698f3e8fee4a68f9652fbac040b48ff1bcbf8251243c6a4f9c91b63f9d247de0d80cef52e9fd6527593f2ceb01749b99277d0f3e922efafa2144ed5d
-
Filesize
6KB
MD5d4970bf6ca695645c1927e421bbc377b
SHA13cbfffcb96cad1f592a87ebcd5a2c48775af5ffb
SHA2563917f0cd278832cd6a8c116ee2a390a1736c9795f731770913d704773bac20d7
SHA512ab3b18fc048578a96f094f69a83bcc6cacf3782b094dfc70d1c007e4f804b7011dad521101d1d759dcc4a71897d25aba61d226a7e4a94d0e9e2c3e6869d5498e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD588abac0aa35d25f7409499f6e6f49d78
SHA13d1c1bc0bac5a61d169b404770e4df5b739eca56
SHA2564d5dc75c38297fa06ff00dc136111f33f11c4466282684ba7cc44784e34a2c7e
SHA5124ad9c7b43ccf7b94f6f9724827c9d99e1e1c6e7bb7bc8ba8ec999d0d2569c28fcc06155c2bc6a6e347c27e95f560c845daca05bfe8cd564fb3da99fff5f5fe9a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e