Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
26c9a13a862efc452934624b17211854_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
26c9a13a862efc452934624b17211854_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26c9a13a862efc452934624b17211854_JaffaCakes118.html
-
Size
8KB
-
MD5
26c9a13a862efc452934624b17211854
-
SHA1
89a4e475c0c386b8e081e6abd5a659492887ea10
-
SHA256
82d2c77bcef4284ba2ef4b23d0c2369c32eec67484258bfdd62d40db6c555f78
-
SHA512
335354fd803dbff572305b2e6538fe9991411455ca5814fa6983567efbb9e6dbcd76332067734df4b3731ea5f4fc31b051658d14fbdf9f54113c83ff29de0bb0
-
SSDEEP
96:uzVs+ux76QLLY1k9o84d12ef7CSTUTOSvwPO3ALcEZ7ru7f:csz76QAYS/1Svwtb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1124 msedge.exe 1124 msedge.exe 1140 identity_helper.exe 1140 identity_helper.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 600 1124 msedge.exe 81 PID 1124 wrote to memory of 600 1124 msedge.exe 81 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 4680 1124 msedge.exe 83 PID 1124 wrote to memory of 1532 1124 msedge.exe 84 PID 1124 wrote to memory of 1532 1124 msedge.exe 84 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85 PID 1124 wrote to memory of 4436 1124 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26c9a13a862efc452934624b17211854_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb47ed46f8,0x7ffb47ed4708,0x7ffb47ed47182⤵PID:600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15770310944019148587,9979467852523961306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e81c757cdb64c4fd5c91e6ade1a16308
SHA119dc7ff5e8551a2b08874131d962b697bb84ad9b
SHA25682141d451d07bdb68991f33c59129214dd6d3d10158aeb7a1dc81efbc5fb12b3
SHA512ba8de0b3b04fec5a96d361459dde0941b1b70f5be231fdec94806efa3ecf1e8faf8e27b1800fa606dc4a82e29d4cf5109b94109e5ad242ddf9f4671e2acbcfbd
-
Filesize
152B
MD52e57ec8bd99545e47a55d581964d0549
SHA1bd7055ea7df7696298a94dedfc91136e3b530db8
SHA256a50ba35608edc2f3360cc71be0d4b29bba0e3382d1f08f24df5322ce2ad2443c
SHA5126b9b73d983c472149629c842e16e4f7c2f8a0a3bb6dd64837ef647db810ef1beb3a02b15dc1eec2c5de8aee6b3ca195c7d26c432705061c5b0ec7841a5bbf106
-
Filesize
6KB
MD5f233275468f3c4e9982078a860676037
SHA13b668e3af0fde0ecccc4b03d5a51c00369640107
SHA256f03b6e321437c4406528266628e0513257c44a0d20ef5eb1a991faf964c5f96f
SHA512795aaf828ae965886a388a10111eca5f924379a4adce255efe5ef06f51945356258352775b41ae2f27505b0a714956b2a1ef65cf689c7957cd67797babb4e9be
-
Filesize
6KB
MD5e38f9575fea03d98f46ec72d1e06dbcb
SHA1d70ea76e0be85e94709206b5ff1a847024860199
SHA25691b1e310237d0e847c2a619fadab565bf7eb174f338e1ba8170ab067c92051ca
SHA512506059665518bd61e82b645278654af4e957b6e72bfca72f53bf4af5a0f4c8e3fa16d9561bdfa02ddf774b4248a93877694bc3f4c17240d49e5dccd974f2acd0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD596d2f25b06a6f1ebd484a22bea1bdb26
SHA15955f5d205f9bb69d0df3d3899d4771991132409
SHA256d2164ba5fb5f0d3c309ac9e4418164feff604388726567f5b29f25a9b412c675
SHA5128255e21b7621445ead6f9ecf9da22c1671f11214d84e6ab6e8cde418d231e77c6f7a67bc43e805286f1c8e48ee1d0d45478a53428ef451d232967f7da5c054c0