Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
b77427973b12792d32873cda3ce2b7f0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b77427973b12792d32873cda3ce2b7f0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b77427973b12792d32873cda3ce2b7f0_JaffaCakes118.html
-
Size
37KB
-
MD5
b77427973b12792d32873cda3ce2b7f0
-
SHA1
34bf58467d8efcc2bcbe2914dffb4863b26c3711
-
SHA256
d22a501182d22bf367810c31a749824abfbb3a3ba4104c8587aa2d976633f637
-
SHA512
0bc248aba03b706a11ad1a7b379fbbf9443ff10130985285f95edafa8efbf5490f2e4f95507afa2457f635e9d1351a33a8243bb02c1f89fec0ac77814a49499d
-
SSDEEP
768:x/bVoRTW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34aRi6781DdRA4vEOjq6h8at:YRTW81D4RA+vEOjz6raA7IaEC81DdRAW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4476 msedge.exe 4476 msedge.exe 1272 identity_helper.exe 1272 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4848 4476 msedge.exe 82 PID 4476 wrote to memory of 4848 4476 msedge.exe 82 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 3908 4476 msedge.exe 83 PID 4476 wrote to memory of 4092 4476 msedge.exe 84 PID 4476 wrote to memory of 4092 4476 msedge.exe 84 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85 PID 4476 wrote to memory of 4148 4476 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b77427973b12792d32873cda3ce2b7f0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a8e446f8,0x7ff8a8e44708,0x7ff8a8e447182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,9179845146450381660,1569932678436884455,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
724B
MD5f82dab8180dcd152fe56fe537877edd6
SHA12401764d532feb5d360798cb2ccc07e205727e5b
SHA256bbf5129151073a74bbd8915fe031e05f12c949658af0c61ed680de2f332f74cb
SHA512eda79029bce3eb29aef48e7e88486a0467840b244f175f7d60a1e15c097aa48d533c85944986ebf682d7a323d719fd8cf13e79061db099185c76d868a251044d
-
Filesize
6KB
MD51106f0bca0a0a88c3011908236e81ee5
SHA12feea325937c144f93c1a2e48521d7dfe308f78c
SHA2566278ef9aa6486528fae35a627d20c9fc129aea98c91dc189e6cbb30a570dc608
SHA512c67fb6c578dd54116e2ad61c44c3b39a95dc908bc652b37cb12fbf258da5a5592b9b49192e866e1254d6642b845f7a96d142f35945dd10ea8c495a154cc6760e
-
Filesize
6KB
MD5386d93f42f631c7cd5944e4aac3e3983
SHA1e921864135e6b1013d3b5a3652b41142b11cd519
SHA25645ef75755d5785a4b21c1beb82cd9b24a29014f430532f6ad9155a7f06641b31
SHA51210ed5d9d2c1bea7124502891188527273f90edc0c49b3b14323d755ec5b7bedbdb6bb0060e3dd83fa943a6caaacb20660376cf3a5e83dfba49ce1f099d85c564
-
Filesize
6KB
MD5ddea021f5ee4d49834370af765409412
SHA1c15a91761c66c3eccfa84692354f2c65836bf3ca
SHA256bb00901a0532f06c072e0a398e7b811c151bd1665caeb30791a46af38b177d49
SHA512b9768955a0524cb2bc350c967678b9a0268d2a90a9c55a68a7a7c61442713cbcf895637ce0e5294fdf33fdf07ad48a8cef046fccd619dc43ba1e9fb1bd1647ee
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ef801e3cdbf01389a8fb8c318f30625d
SHA199600522ecdc8cbf79916ee89ccea7f2d6aaad3b
SHA256c6ecd8c1bfe97662083068221e00145593976b91aad917f0cbf6aa85a134f050
SHA512eb9a68f45d832dda4a1567ae27310e62cf45b2c0b68064cb2627bd21b73078e83bc5732bd1e6e7c308724356b1a6c0901e0d4606f249e87a3c8ae6d714770876