Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html
-
Size
14KB
-
MD5
7f7104ffc863792e0f0056cf199a12c7
-
SHA1
61db82abffb4f0112a56e85767bdb380e41abefc
-
SHA256
329057be9403f27e3d9df66a5494291ef0c815e66a8ccf4e02c429deabb9edde
-
SHA512
189a29efcbb035580c4ba82ead74cd9bf0993f8d8b18be9be62fc674d40346a209e15c93b8b8abf6141922d4e35dbc359b65a03b4b0e11d0338907da0ef7fc59
-
SSDEEP
384:Rmbp4ll/wp1HMNbDRQqYCEeRoqQuHeNY8++8GhRYoUybUvdZqNgTTazi+g8gaUw:Rm1Wl/8MNbDRRPQua++pXbNVziCgaUw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 3736 msedge.exe 3736 msedge.exe 2612 identity_helper.exe 2612 identity_helper.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 404 3736 msedge.exe 82 PID 3736 wrote to memory of 404 3736 msedge.exe 82 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 2060 3736 msedge.exe 83 PID 3736 wrote to memory of 1904 3736 msedge.exe 84 PID 3736 wrote to memory of 1904 3736 msedge.exe 84 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85 PID 3736 wrote to memory of 4124 3736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab1d546f8,0x7ffab1d54708,0x7ffab1d547182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12207191564444160632,4698771524532605298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
5KB
MD586d4de9cc7b5e008b98607edc840fe1d
SHA1a1b59dd79d9842832fa76873e24bea6740919e82
SHA2562d0aeb7fdddf14f24a85a98a3fc76debb153689fa5c191d134d41bd5341bc8c3
SHA512ad84c06a447ad1cae3cb581045f99a461ecd2e44a794e3a697243eb2891833fa6524adc30eff68f3bd3509e571b4cf4de691043fe05e8a7e23dc4c4c243d4ff9
-
Filesize
6KB
MD554265d3d498a0bb8935e0b09d3ce2d77
SHA1d8418165c47da899cba6d54b0014e2126befb73d
SHA256b9010705f53b22c80dd1348971ad4ec5c932b025ae478f280f7f91782ecd7e96
SHA512bb05004b0869d6ed6047e173d25ff180e37692455e7df9c856de57ea816bc6fd117bdafdf48be0e166333d35218daf66f96604cf2ca4a9e87454c10e10ea9507
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD596a54d5b7ee58ed28299feda711ea2d9
SHA1e1b5b3e2e57848bf79c0f529d8075bf5ea5c865f
SHA256ef50124de3451c9c0b5f15e2013b9ea38dd6ba3049829310a52641c138008add
SHA51295c1474bea60090fdf0e091a94454a276e2e7f72a0feed6fd44c97c84024aa4385e10e7dffaf93a1d78e8384bbdbc896c8c0a48309a3371e0f4ad106b2bc9b3a