Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
a7fc15043f5fc7d14926a6ebe3977390_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a7fc15043f5fc7d14926a6ebe3977390_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a7fc15043f5fc7d14926a6ebe3977390_JaffaCakes118.html
-
Size
138KB
-
MD5
a7fc15043f5fc7d14926a6ebe3977390
-
SHA1
97a797c914605cd51a79a7120dc281c35f7c9e2e
-
SHA256
dc1c63fac14cf2bed9bc5ad0de3d7c7592dd97aaf294096d96e3dc9045f5019c
-
SHA512
4959456dace446ed2297569b927366a7aafc7fce34bae12dec1838a0fd6de9ddd40c8fe9114075293b02014db442157474f29121fb593b19c3b66290a372862d
-
SSDEEP
1536:SEAUqHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:SjHyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 560 msedge.exe 560 msedge.exe 3692 msedge.exe 3692 msedge.exe 628 identity_helper.exe 628 identity_helper.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 1328 3692 msedge.exe 81 PID 3692 wrote to memory of 1328 3692 msedge.exe 81 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 2392 3692 msedge.exe 83 PID 3692 wrote to memory of 560 3692 msedge.exe 84 PID 3692 wrote to memory of 560 3692 msedge.exe 84 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85 PID 3692 wrote to memory of 1400 3692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a7fc15043f5fc7d14926a6ebe3977390_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf13e46f8,0x7ffbf13e4708,0x7ffbf13e47182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,162186958985943752,381015011565584440,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD57bdd466d3cc2702b5480ea47bac8d6b7
SHA17ec917c3e5dee37a5dd413b6ec024df772360ee4
SHA256de7e6aa2dadbfd7684e49947802ef85a77d10f3f75579d87fd74125b5c660f51
SHA5128dc7751090d19d11e3ece4bc063b62e7dd2920e0a71b781668117409a3cfa5bfdfc6ba4fafb63d3fec1788e72b6bfd9254bece25b89ca2cbbdf3e21eecfbb251
-
Filesize
6KB
MD5e26a5eaa6f53a996a8e437e76774f990
SHA1df88c1dc9a2733178baea65f349aeb0e5e503db9
SHA2567be44b136bf8d59fd7c9fb827a4d097ced30212b2f20f9d52413f706bdc3d8a0
SHA5121cc8d4f0de7825bedb2d9c8b5a803bd252074bd27193ab1353e1848fee9d0c7366a204eecacf34c7f56f362715f2f1a62280ec91fdcc9a8948e91354145bad94
-
Filesize
6KB
MD549779dc78fea3f029ab2f0fbde043a7c
SHA1739f1f106074067edf2bd16312e8564a15718200
SHA256047e15fde20dc55f994eaaaa9cd96b62e5736124d917f88299e416c2f0a8184c
SHA512304a167f47259b128e41ed4b43d8f683dcfeca7cecadf48076bf946e49f2798284d8c3b7e1c266bfe2893236a86a161672fedbdb1f4e3b5cf6bb60cde5c3b366
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5823f4f605b3fd6ec2741add82eef8cc5
SHA1a5733235f81f453d3f3372ec700c866c63caf7b3
SHA25645e871ada06b5029690059a64f9e0feb01b40a29addb32e7b9c2405598c2e78f
SHA512c4fc753af17ba0048e858ac2297470130aadf8dfd00e7ffedbc116631d1df4ccb0aaa7981771b89980098d757d2ca81342604d30d7667f7ed346b3d6902b3c23