Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
26ef99fdf5105b3b14006eea7bd9c376_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26ef99fdf5105b3b14006eea7bd9c376_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26ef99fdf5105b3b14006eea7bd9c376_JaffaCakes118.html
-
Size
2KB
-
MD5
26ef99fdf5105b3b14006eea7bd9c376
-
SHA1
39587ff8525dabea04a25a40f246578cb418b452
-
SHA256
5a602e98b5101395c3f1df3de1bc678d7c87bc099f6d1640532a289cdf2ebfa0
-
SHA512
acd1cc144b3fedc9fdf20e78f9b338d4710e0091a9ecf1fc7e37b832048730769bb511adfb73c94cd9ec894d2523053b6223309d5be4fdebd6d2fa3713066154
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 2068 msedge.exe 2068 msedge.exe 1848 identity_helper.exe 1848 identity_helper.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3088 2068 msedge.exe 83 PID 2068 wrote to memory of 3088 2068 msedge.exe 83 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 3684 2068 msedge.exe 85 PID 2068 wrote to memory of 4552 2068 msedge.exe 86 PID 2068 wrote to memory of 4552 2068 msedge.exe 86 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87 PID 2068 wrote to memory of 3464 2068 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26ef99fdf5105b3b14006eea7bd9c376_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3e146f8,0x7ffba3e14708,0x7ffba3e147182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16479202585180501353,5026311032521722609,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
Filesize
6KB
MD56bd4288389d6eaf132dd438f47e848a7
SHA124dc7cd07fa435f79eae2120dd59abd568792611
SHA2569e722d8f3d672c02c2f4ae13b72ee17a41a7a65175780588b87c19db52675ef5
SHA512afac781dbc6de63671722a24275537782c1b97c7ebc23f74157fd8192c3e5aec1c79b92c49471f99c651ecc296fac47053336248f2f5533db1cd3be8e4233348
-
Filesize
6KB
MD551631093b03e06ff0898424c53fedfe7
SHA1e57a00a1b5bf3463cba8749fbed59157ec41dfd1
SHA256c3991f059390bbcdacaa44723b91517af2f363dd7f0396df0b6e93718dcf4181
SHA5120c4b8a8ef2409e3b74510b7f9d4f5803472773fe77e66ba93dc92a58d7432f75cd6e6c70348e01845cb9f41a9f44ee1f031f462226d49a354c0e16b6e18fe601
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50e5c81828df09e46419f83db968705e0
SHA1a65fb4e234744343031854f77fecf9728cc036b2
SHA2568214da50dd54914c17c633f9d9f7265412e5b1614e4f9b5317ae175548288356
SHA5127ef482bccc573174c82c534b2400497b3829f45b74c41697b9a2bf3985286759d8a41f580c77703fa1af6909af42e2942e2e1cc8112c447dc0da0c5d0930c13e