Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
7ff4e30f2ba8391932ca223ef7164223_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7ff4e30f2ba8391932ca223ef7164223_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7ff4e30f2ba8391932ca223ef7164223_JaffaCakes118.html
-
Size
34KB
-
MD5
7ff4e30f2ba8391932ca223ef7164223
-
SHA1
54bb5f403000c766e0786aeac3435a03a8803e69
-
SHA256
8caf0313e62740472b456d10003421f6d053ab40b860f250cc67137e5b40c3cd
-
SHA512
51e205e6d2380b0243090bc4511273a299b61922772042db2f6546119ec60da8fdff87bf707d9f66c1cabc76f6ae9c7aadfd89c75a37a459dc99ec40cf5f42cf
-
SSDEEP
192:RuOoih/Pb5n0nQjLntQ/fnQieTnrnQOkrntJ6nQTbnSnQUhsYwVqwVPwVQA37wV9:oOoM9Q/7G6A3c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4160 msedge.exe 4160 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4384 4160 msedge.exe 81 PID 4160 wrote to memory of 4384 4160 msedge.exe 81 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 3076 4160 msedge.exe 82 PID 4160 wrote to memory of 4580 4160 msedge.exe 83 PID 4160 wrote to memory of 4580 4160 msedge.exe 83 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84 PID 4160 wrote to memory of 1164 4160 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7ff4e30f2ba8391932ca223ef7164223_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe41846f8,0x7fffe4184708,0x7fffe41847182⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13540378039200303561,3418638267994374017,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5b75dd1c41f57883670b9e2c23eb9c7a6
SHA14c6f7a301bfd1d338118520b824f0abe4f065445
SHA25640bec08fd991b599bbb3d06fc7c3fe6ee4ca5846b2de9bf650569d4e8090fca1
SHA5122b66e57bd09adcdd7c1dfd63128be05bb749fb8a39c266ceb66210cf339d662dc190ec31162d7a6be06f4bc9fd3f7f75ea74d271c2b4dfce120b7e642fb4f21b
-
Filesize
6KB
MD5dcd43d77b0e97a490fdbd917eeaaef15
SHA1ba8dc64c06fdfe6e78ce27dc3bdaedb6d8917fa3
SHA256690a8302c871a377c3665888093da2947b4f3ad6d30303d8855bfaa6bd8b4e08
SHA5124bcb6f3935a5eb9b5899624351ac1747361da66e4a1a22a317959e7359986f29da7406bb38d4a6bc914c5262c6c398712fa04acd7def62775aa436134aafd839
-
Filesize
6KB
MD57be7b90555a9364995305b08e65f8106
SHA163b07f6484e79cd39be6394b526402561eec1c07
SHA2568448a09b5159038723264f7d90745513624bf8be3e1f2d53678d7734e45c05ef
SHA5124cb9e8dfd0350401dc014dfd59799f4bd756a6ac9b2fe69d9a27961f11f72484c0bcb9c2d196ce2d89851cf68e5fac1291e54f507d5382f7b38546dbce7959d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a799e7157d45ac6ec4fae3c16bc7b849
SHA1b2efb48c27cec493ac8e6091686e85384cfd50c4
SHA256a9c96f446daca97165dba4c78f6f7b1c9a96a77f4bae3fc55a4157721060ed37
SHA5124ca9e97bbd8e067bfb83a1dac0da0ee50db65b1d49fd687b98ef94a5aa20c629f4fd8ed8c2f881a5bbfdbe843c4e019ff2f67fde47abb1bcd4e65a40bf30797f