Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html
-
Size
44KB
-
MD5
7507d4b158c2f831aa344ef5478ad751
-
SHA1
ca2113897b23e4e94e6c4ceccfaf02ac9c3845c9
-
SHA256
794d649d9a153ebe34749ffbe3dc8852c9b6106cb5e0b701acc580e1de4d06c9
-
SHA512
e1c58a1cff25d90787188fb92099450e67cc28bc34f2fdd9084a5c33f1628b7fc5beb8f2a61f0e0c72bcb6bb6954dc069e76e337d8719c513baf85d179561dc8
-
SSDEEP
768:ET0Tcv8J5JDmR7JUnYfFrtAhXo4UfPqJMUjQGv6NM:EUJ5Ml+njYNM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 4684 msedge.exe 4684 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3820 4684 msedge.exe 84 PID 4684 wrote to memory of 3820 4684 msedge.exe 84 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 3004 4684 msedge.exe 85 PID 4684 wrote to memory of 1196 4684 msedge.exe 86 PID 4684 wrote to memory of 1196 4684 msedge.exe 86 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87 PID 4684 wrote to memory of 1936 4684 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7507d4b158c2f831aa344ef5478ad751_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e75a46f8,0x7ff9e75a4708,0x7ff9e75a47182⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17395328936853456766,8147819192884572546,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
5KB
MD5d2b2f1c07455ff5c9a74b2b6cb3c8b4f
SHA14be3fab5608b93af86d1c17f09f191b6a05d2473
SHA256d64d9bab03fad61a3a8867546751d6f19a6ba259edcfbf59184fca768f24462f
SHA512d372b28ba8fd0a900009c5b60bf5b20b3136c186dd7c553d18f68225ea2a11f9ad1184f0ffb4a96c9c3860743b3884e3c3559fecc35b47e888be6640bc30ae73
-
Filesize
6KB
MD5ca459d5d88646081804732887634414f
SHA187b76bd6a1977008e4f56bc65e68ddf675b666ed
SHA256a780e0e9373c7c10a07838519b005accd12b4e180318d70b7a37489bda9e6b72
SHA51235cfeb375c58b272fb533aed836b20e4955a5d72970d4b35d521693bd9be7f61066356c4877d44bc8acfd476129a6fd4e638a9b2225e6ae7285cd0c4b4851ab1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ca8b72c8f8219e79ae2db7700115e51d
SHA1d2af6dbab0237472dfcc4f18a6799b14e460e9d9
SHA256c8ff8b2fdf4e31993176b29dabfa8c9214d36ae6fa7f1343450ac43332301dc3
SHA512cdcf7609a84f5d3ff75b1c5adb4938852779bb7aa4030c7f7723a4badfe43e460f8edf9020981799ab701d03e65b1554cd8af29bbdae034cac519e7a9eb12783