Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
27073d8beb24b8ab1f98a0e8d91b0dd8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27073d8beb24b8ab1f98a0e8d91b0dd8_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
27073d8beb24b8ab1f98a0e8d91b0dd8_JaffaCakes118.html
-
Size
67KB
-
MD5
27073d8beb24b8ab1f98a0e8d91b0dd8
-
SHA1
c665f65d4f591d943237b7734fb856b0df5dcdbf
-
SHA256
62e1b1b0034d8f1bbd26952cf356ad52c50426e46a3971a2a6e191d381bd6135
-
SHA512
6627f3dca63f7f5ce0b9996e8a4dc571ecb13b95207a455a6e69fb00002fea647d956bde24b8e13a02b0abb0eeecb261265fcd8c674760e7fcbb457536716242
-
SSDEEP
1536:VCC+yfE+xscZ6di+cKTz9wxOSXx6MMazD4BCYWNqlcaa9c/W8vPO7LtVXoo52Hu0:Wc9iZ3J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4744 msedge.exe 4744 msedge.exe 4384 identity_helper.exe 4384 identity_helper.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3448 4744 msedge.exe 81 PID 4744 wrote to memory of 3448 4744 msedge.exe 81 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 3724 4744 msedge.exe 83 PID 4744 wrote to memory of 4496 4744 msedge.exe 84 PID 4744 wrote to memory of 4496 4744 msedge.exe 84 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85 PID 4744 wrote to memory of 3824 4744 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\27073d8beb24b8ab1f98a0e8d91b0dd8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffcc09f46f8,0x7ffcc09f4708,0x7ffcc09f47182⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8325339675316850659,8718899305364598749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbc957a83b42f65c351e04ce810c1c11
SHA178dcdf88beec5a9c112c145f239aefb1203d55ad
SHA2567bb59b74f42792a15762a77ca69f52bf5cc4506261a67f78cd673a2d398e6128
SHA512efad54eb0bd521c30bc4a96b9d4cb474c4ca42b4c108e08983a60c880817f61bc19d97538cc09a54b2db95ab9c8996f790672e19fb3851a5d93f174acdfac0ce
-
Filesize
152B
MD55b6ff6669a863812dff3a9e76cb311e4
SHA1355f7587ad1759634a95ae191b48b8dbaa2f1631
SHA256c7fb7eea8bea4488bd4605df51aa560c0e1b11660e9228863eb4ad1be0a07906
SHA512d153b1412fadda28c0582984e135b819ba330e01d3299bb4887062ffd6d3303da4f2c4b64a3de277773f4756da361e7bc5885c226ae2a5cfdd16ee60512e2e5e
-
Filesize
1KB
MD5e51e927ee614556f26ede3292851ba6e
SHA1e95ee9244ab5f1fb30bd6d1c0346b2b71c32fc85
SHA25657873b78934e34314863f76f38b0568eb35dc45d0d9d9155ab654fe45e40518a
SHA5127446325f586a2ef5b7957a4bb44e888e06f8baf39f4b379b2713bba766452ff0f7b0ca86ad7015d3cea049190a6fd68005e2b3c6b2f0a7831278c50353560afb
-
Filesize
6KB
MD585cc418a5ce503e35ca4540512e418af
SHA1ab912fd8f6a1853be238f349ac30bf04dc3a38c6
SHA2560d436de335844b6d74b3892e059ebeace2c5f94fcf9ccaaf5dc35be30952ce54
SHA5127953d8799962c56c19c856dda923c607f6023d2269ea81979126e230ca720a41013e62f988512fddaacdc608b0dffcc766309241b36b0fec72040c2675ae8acb
-
Filesize
7KB
MD5170a1b10af30f948b6840a960116adf7
SHA1805a0e6ed46b98c88187b8467b5b4d4e56b2b6eb
SHA256a676c11dca97eac3302a43f875707cab7ca871495ffde42fba3c343f68fde507
SHA5121a8203ead855a4bf7b956d12e35b8f9a6295a250cee8c39ed8941325cfbeab426591c886e4f1ef3c69714d685034b69d6745bb0a522a79dd23e32543b8c19394
-
Filesize
6KB
MD551b550fbca0fb65f66534955f00b4e76
SHA1b579a3c4c1812506f368c4af3b8711e69bd10dae
SHA25651850b2a9fee2611595c82fd9ae02da8f04852a4288c13ae1f7618a3c1edbd2e
SHA5128da818105c5292d2a6ca30bdb4d3aa01ddfafd97a4aa898a3c6ed568c18a6d7f08f594916377fdabba585a3effc6e5a5a85053d77c68564a2e620fab307232d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5559e51fc131743bde00c9d1db88eb30e
SHA1450cce0fb6bb096097a596511a81cbf52c542e3f
SHA256f5fcef23481a7f60481fae221cd68c06ff1ea3d3b979eca3cf0bd4e6b954f2c2
SHA512c3d78a2d6be5085bfd7d53e1715b0e5d3b69776f30e679d97b780b3fdad38b00da70e71558f47ecb4b79bf3c4dc1c1e56e661e45cae276b7e493dfe51c14f8f6