Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
7f4b0497600dcd600b5b1a04a98d3a2f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f4b0497600dcd600b5b1a04a98d3a2f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7f4b0497600dcd600b5b1a04a98d3a2f_JaffaCakes118.html
-
Size
56KB
-
MD5
7f4b0497600dcd600b5b1a04a98d3a2f
-
SHA1
1f74731372680a248b610401c421d1c4ad0f57bd
-
SHA256
90659cd4201e6fcbf9bfedbc677b63882ad3bd91514e7b7d6b1ea6a5518640d4
-
SHA512
c77015034fd99d9566abb3ad16be53525b79a7ac4c95b60920b1d6b4e4ab736f774e3ab35775b848a82d5c0c62fbb5dc02cc15fd01e967827094a72015b0b01f
-
SSDEEP
768:0akDdgkgDAsqQL6n+b9pPqjOl5pbZ+4YvMZrjhTne61N:iDdNg8sqEPpZTe61N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 3416 msedge.exe 3416 msedge.exe 2116 identity_helper.exe 2116 identity_helper.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe 1056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3416 wrote to memory of 100 3416 msedge.exe 83 PID 3416 wrote to memory of 100 3416 msedge.exe 83 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 4840 3416 msedge.exe 84 PID 3416 wrote to memory of 1932 3416 msedge.exe 85 PID 3416 wrote to memory of 1932 3416 msedge.exe 85 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86 PID 3416 wrote to memory of 760 3416 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f4b0497600dcd600b5b1a04a98d3a2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb3246f8,0x7ffbcb324708,0x7ffbcb3247182⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,12496073926982692305,14593576015867960554,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
395B
MD5a78019734f8e7dc0caabb5310f4f3184
SHA1a327bc82b31fb278497759cfb1dc1554102e6fac
SHA256da0e74b8d73a21d2d7ac9134b8bb7d9a6bb7c5d4a0b31570e3e5da8942d5dc98
SHA512961db2d8d6b44fec063a39753a9e35b9404bd21052839d4bf89910bc6d334c144ac655a326192a78d5e2fba538c152038e73c47c878b839e8ecc218014f67106
-
Filesize
6KB
MD55651f6573f8106453a7efba344bf4290
SHA1f4e9394b5fbd1530a1344a5d87f66ea0d6828f5a
SHA256ad3e6233a5e23800b312197e7eb7b73aacd89e4868d7f9075a35af10e51d8b82
SHA5127663d62d0f90de8fc91f9ba3d328401eedee68e5ad82ef33579d706058e9d688903a5107283d9e9fc1cbddee00cec5d1aff0b2a2c013d5390510fcc2f790ebd1
-
Filesize
5KB
MD5ae2952aa029c1a08d61d0308ce3e9e25
SHA1fff2fcff047476392480df351ad862de60af3c59
SHA25675e0e0bcc2990a364a4cf8327f4fbf32e62b9b2db26bd74c58bb612ffb8cd9b2
SHA5120bbf60fa9d7ef195dbdb6a4effe76492519382208e9481479a077b4aff2333e058231a64822f33fe03fbb0cba2f549ca0a46a3ffb35480842bc26283ceeca8f9
-
Filesize
6KB
MD52cd9060c65c8d9c298e8057c6f7a0a09
SHA11cc8d473764c0a7a2c0723d88df70660ce8cb201
SHA256e3509de6fc753152c7554881e89f72d0a404ee4ed3b805639090ed4eb25f0f1b
SHA512d6fb2fe3ebb0f835af7978b8a7842837d7794539fac578de5e64c39a84031f1b8335dc60aa5f402d812407fb25788d39c50fb401742210c5b936f016d6c6c5fc
-
Filesize
203B
MD53893e16792f0b52fdd33997c071aba7c
SHA162fc2f03a64e0ea37475810031ee3e9641da159d
SHA25611e2283775107faf74b9edcc77c6fbd8a45838113a37ccb4437af33479a58dd2
SHA5120ae76d1454a4576047cb3e4b597fbac80601ee536ca0e160fae1db6d03dbb19d45b43e1038713ab595df788b2325b2272067e2a040bc6bcb91d6ec45f41aa0cb
-
Filesize
203B
MD5c05aee0b1bf9d097392ce65f9e0fb5fb
SHA1728a29b8c7a9149f4ebb86ce74734dddf69251c8
SHA2563c55e1a768a81ce3ce9683dabeed13d19de913323c8a420742074790e64f191b
SHA5126579ee7daa9c02f576232f6dc6b48a1229f0e9483494e94a38e67e6366daf89d67a2876d55f45b839839968c82cacdd11266440abba9904fa9d2dabe7893c689
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f0ac96e31db8740d9a11ca89b1919fd5
SHA148025b95835d0448541c4366a9ab9caf59a7d3ed
SHA2568b4ffbc1828572a8a64ea56022589f5c536975c30c6a25358977742d0c49c6ce
SHA51211248bd1347629b0f7d0707f2d63779a0830fab993af7b9489ce03e84ba9c0f0007ac5a52a6727e1571ea268adff7b777843dc14358549e000e6dc42bfef227e