Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html
-
Size
2KB
-
MD5
26d82af6a31ba6877be1c8be80cef7e3
-
SHA1
c2bf2bdf14cedd1d709240f8236f44eaa8ab6899
-
SHA256
f117fdf2e097316d42b5bd872216a14e0e9d3aa05a84f75d08fecdee5ed0a397
-
SHA512
fd3400e1b0b05f8eafbc9c53b387cc3ceb585490b23a6b811a787a91e9844749ebcc12f2cf2970761d5c5fd6b40a37808a3e838a9641e6cfe26ac305c4cdc7e1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 4860 msedge.exe 4860 msedge.exe 3788 identity_helper.exe 3788 identity_helper.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3012 4860 msedge.exe 82 PID 4860 wrote to memory of 3012 4860 msedge.exe 82 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 4568 4860 msedge.exe 83 PID 4860 wrote to memory of 3572 4860 msedge.exe 84 PID 4860 wrote to memory of 3572 4860 msedge.exe 84 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85 PID 4860 wrote to memory of 828 4860 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26d82af6a31ba6877be1c8be80cef7e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9059b46f8,0x7ff9059b4708,0x7ff9059b47182⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1411314984424181481,1545799859206018134,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e81c757cdb64c4fd5c91e6ade1a16308
SHA119dc7ff5e8551a2b08874131d962b697bb84ad9b
SHA25682141d451d07bdb68991f33c59129214dd6d3d10158aeb7a1dc81efbc5fb12b3
SHA512ba8de0b3b04fec5a96d361459dde0941b1b70f5be231fdec94806efa3ecf1e8faf8e27b1800fa606dc4a82e29d4cf5109b94109e5ad242ddf9f4671e2acbcfbd
-
Filesize
152B
MD52e57ec8bd99545e47a55d581964d0549
SHA1bd7055ea7df7696298a94dedfc91136e3b530db8
SHA256a50ba35608edc2f3360cc71be0d4b29bba0e3382d1f08f24df5322ce2ad2443c
SHA5126b9b73d983c472149629c842e16e4f7c2f8a0a3bb6dd64837ef647db810ef1beb3a02b15dc1eec2c5de8aee6b3ca195c7d26c432705061c5b0ec7841a5bbf106
-
Filesize
6KB
MD556f8dcddd190b65a6f8fe89e995f7b3e
SHA140cd50133072b10f0df3f20e42ec09f9b0b5db95
SHA256dbe766554fde312e5ad40c9c749b48542b69abd9dc62aa685c686a398476da94
SHA51267e0c598743dd7b8366baa751b08b5ce2836a596ec3e32600d5c52e4a0753e4067c615660c97ae27bfb9f60360025f0f7e6d0ed252d9fd67a672c1619d06d590
-
Filesize
6KB
MD5883caa2e34a13c7deaf6fd49a1ac6330
SHA1c31edd2b12d997e03f87362f93295ee8854a06ad
SHA256ad52801743603e83770ce652f17f1216866ba4e4960d7b9f356fdf037dfb6bdb
SHA512a5394d3175b82b730c84f93c65517fa53d96bfa591b5fe035d783d4a5e137a7f6cfb0f949b63deb8a649367b91f6cc52b5f2acb1a1dfe212bcd76a1deec6ecd3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ef4cfae9b2776e1d4af0b1ae6e3b0843
SHA18e5fd09fda0ed3b9b794126ff14a95e0cf2729b9
SHA2569030f0b29391ee581855fb6ffc88bee787e4ee7cde5b4a6fbef005af23caedde
SHA5120a7c56541e5414357ad03d925573dff5c062c36a8e5e736017e7ecf56cc301701c3cdef4bd1be9cbf760fa5be9eaf96455646857064de699a8c64c8ca52213e7