Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
7f6a973b1006feda78240d59782d1725_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f6a973b1006feda78240d59782d1725_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f6a973b1006feda78240d59782d1725_JaffaCakes118.html
-
Size
343KB
-
MD5
7f6a973b1006feda78240d59782d1725
-
SHA1
f1f0aa48efe3166359073f5adbff5e0d36936348
-
SHA256
bad1dade3c643c49b0c1d8e4821632d402f2af5cea6d3edcd57b8dfc62113d34
-
SHA512
bdbb5075bf5a3b28c4bafaf12b493fbee4c37943ff9641a08af89128c3c1c9e4b516dc92274f7ca607732a9e101a11edafb74871809fc58fa14cee8c94cd70c7
-
SSDEEP
6144:SUsMYod+X3oI+YCYsMYod+X3oI+YcsMYod+X3oI+YQ:V5d+X34m5d+X345d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 4472 msedge.exe 4472 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 2780 4472 msedge.exe 82 PID 4472 wrote to memory of 2780 4472 msedge.exe 82 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 1184 4472 msedge.exe 83 PID 4472 wrote to memory of 3660 4472 msedge.exe 84 PID 4472 wrote to memory of 3660 4472 msedge.exe 84 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85 PID 4472 wrote to memory of 1608 4472 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f6a973b1006feda78240d59782d1725_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17891140647291430096,9956279357521117917,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17891140647291430096,9956279357521117917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17891140647291430096,9956279357521117917,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17891140647291430096,9956279357521117917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17891140647291430096,9956279357521117917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17891140647291430096,9956279357521117917,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
6KB
MD57f75db7dc574e140df87292b3ac6a157
SHA1c8a4d79fe69b72d0b960e7e29dac914e664f2be0
SHA2564df2774c20aa1ec07595c0b28979148790b7ac65de999fca67e990d8d03faa83
SHA51291628ee15317cf87f235ef9628b418ff79ca735ed8c581d31e5db8520027081f60936776e4a5e64bd718d7ccc5ad59a64a0b8848fcc4e0e6f1704d558b7e1fa3
-
Filesize
5KB
MD507593dd76e75cc25eab1224c5c680151
SHA11878e0bc6fff860b9d58d08a1d2d6813b08945fb
SHA256ef7e7b179d1114b7192ac566eaf5b61731e84da5708f31eac721d9443f6f5dc7
SHA5126d06d4f05ad94fffc121c92875e4488acf06310fa57d5a5d133293f2e2325f86e7be03f91d6bceee60ae763e1189ca2005064f7625c57da22036f06264fec438
-
Filesize
10KB
MD5e90e053c7dac2934e73f50975188c641
SHA19f203123894ddcdcf93026bb18c23e23f855c1c9
SHA2564f38868a7c4ea70966e87d9e08fe6bded398f069625a3e96205f68723f003138
SHA5129fbd62ba1107c1a9ad8e1cb2fb4d8edca3a942f62ba16bf798c569a0f3ee66e5d501fa632fb0d8792ded079877c9844f550bef557952c3df41250149fb31b01b