Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
7321c37fdf938cd915e47b1771ca6b3c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7321c37fdf938cd915e47b1771ca6b3c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7321c37fdf938cd915e47b1771ca6b3c_JaffaCakes118.html
-
Size
42KB
-
MD5
7321c37fdf938cd915e47b1771ca6b3c
-
SHA1
e02b96999f4aa351952c9dd67f1b2da3a68cf531
-
SHA256
2cfd4bb88a664ed7402602d1df9758f441f052be4ee68a6b8ae777fae291b9dd
-
SHA512
4d2822620192e7f13a23bfe9ae13b8045f7a08f814969f269bff06f354f4463e1c80dae0acd9950b86da56546f84ea36e0f52aaef3191d39514faa8f2c7bf9a7
-
SSDEEP
768:SZyYWzCCAPDnOuONSQmsB3NPeBPmxph9lB3fGqqK+qDVAIZSy3h3ApTVSs2QlsL9:SZyYwwK1SQmk3NmBPmHh933fGqz+qmV0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 2264 msedge.exe 2264 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3524 2264 msedge.exe 86 PID 2264 wrote to memory of 3524 2264 msedge.exe 86 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3388 2264 msedge.exe 87 PID 2264 wrote to memory of 3788 2264 msedge.exe 88 PID 2264 wrote to memory of 3788 2264 msedge.exe 88 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89 PID 2264 wrote to memory of 2936 2264 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7321c37fdf938cd915e47b1771ca6b3c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd0d146f8,0x7ffcd0d14708,0x7ffcd0d147182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17214529918627858122,12410448804884849252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
6KB
MD583a22dff44617eb69917232bc90e066a
SHA1135d55c68cb0efb9bd0439fd5cc130ccc9564de3
SHA25630e925e3475fe97a3e6336026029a80c003ee9bda0374bd40ab0970f772ab712
SHA51216d3c029e3ed6a7889c0c4ceea3e68599a260fb4ed256ee48af8eae7982dd68831a33251fd73aa85e8bfa022379c85869bfcc93460b6a054ba0db669bdbcf52e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b5c5747e-686a-4870-b5b6-833d052d6adf.tmp
Filesize5KB
MD59a03d47a87c25bdd2ba86f02fabb8408
SHA1068a599acffde1b160a99c5e6e781df4c34d55d1
SHA2562217e37b76698e1f86b10b7511f68e2c19a189183b7be03117d771b80d261947
SHA5127815d79574dc41e33bdec0f3b452037f75a33660d2e64892ee8b2ed2ea973b9f59f8f03206417deb26cb12ec73001aa6102dd269c21976633da6b5c9b7d565a9
-
Filesize
10KB
MD520b771762103f20c3dd1542e0f5d3513
SHA1a62d506e71f1254c8533f58465b5f81e4c7d5990
SHA256a71aa5455cf78f83a65a97271cb34626516957d9371d51b0510bc771833944f4
SHA512753f75d68a7a4fb7a7b63cf7f79f6594b2fc5f79bc5d07e8aa27afb4d384e4e849c71cd7e2ff6ed3375583ac0abc6452daac308ecb61eb8b81daa6b79abd2af7