Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
7451ed0c628b22f6ab8e5b3d3751e7d1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7451ed0c628b22f6ab8e5b3d3751e7d1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7451ed0c628b22f6ab8e5b3d3751e7d1_JaffaCakes118.html
-
Size
141KB
-
MD5
7451ed0c628b22f6ab8e5b3d3751e7d1
-
SHA1
8c6a236d53de0b8f053fc38426d7c0319e10ffb7
-
SHA256
fc4a21a9f52c1d34cd143824b152b3290b6d011907bae130a8804fc1781d025c
-
SHA512
63b87336912d8d9bec8961df3079a324bc7cd0b245e8f83988b3365741be9a6e868f951b282665d0bdba55b95c735dad99f5a8b5a34821e7a04c11579451dd77
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcPr/HAPhhLkI+lGcZT6uoWp:swaPLgGO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 4416 msedge.exe 4416 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2896 4416 msedge.exe 84 PID 4416 wrote to memory of 2896 4416 msedge.exe 84 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 4284 4416 msedge.exe 85 PID 4416 wrote to memory of 3928 4416 msedge.exe 86 PID 4416 wrote to memory of 3928 4416 msedge.exe 86 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87 PID 4416 wrote to memory of 2388 4416 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7451ed0c628b22f6ab8e5b3d3751e7d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd248746f8,0x7ffd24874708,0x7ffd248747182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3800065788619152726,796703708150697740,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3800065788619152726,796703708150697740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3800065788619152726,796703708150697740,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3800065788619152726,796703708150697740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3800065788619152726,796703708150697740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3800065788619152726,796703708150697740,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
5KB
MD5b07988f98e31bed22f2bc7fa956f360a
SHA1d7f91ef8fe860a58cdfaad02bdf6a2e50df00832
SHA2561d74255b4bb33d288bff157ec7dfcf4e3d067fd3f83b589aba49ff6325e16fe3
SHA512dec4785ea6dc531f4bf770def5a1f65e2cb33a21bdb15a3ed2e018748f28db126c66f9f7866cdc32541860f2fdbf084b6f66fe1a297c4154a3f1aac360b511d3
-
Filesize
6KB
MD56a9d01ac79fe8bfd4c8b48333ae4245b
SHA1e9aca342248d4f59f5adc04e4d9d14747484e9c4
SHA2560ff60c46baa4676f824c41f43bbfe2bb4d03eac7d6ec25e1db8840ceddafa2be
SHA5121638503bc462bfdf2cef1dff01fac1df67228cf09a821b9ff8dfc25a8cec40822befcdee81d112d4efe5f7a7f338913e4131ed274b601a2c8f288b09e4623a70
-
Filesize
10KB
MD5bdbc9ed97346693ffbf455395c1bf7f9
SHA1257ed3b357f9ab789997c1409375848a07d0529d
SHA256f18e91afb941c8efe46e5285e6ad6eb05035f57e291fe480e5f5a75f3ca436e4
SHA512af7f61d708b20f1162fb71622cbd44040d67f0847a783c62d2387782b04b1a5904f81b3e782f57ccdf304e29a47824b1eb3e6f61ab7209429b8797c039bc3c66