Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html
-
Size
44KB
-
MD5
7763b23e2c96384f340da8e57baa5d8e
-
SHA1
81c082aa6bd0eb4d1ca73d3335f6afb564ab0f3f
-
SHA256
463e312e31d82d49244f9b0a1a989a35bee3a8a4346f5406d311c97691bfc3c5
-
SHA512
68e0b03578e5002ec4cb4ad03d7fdb3d452d5d94d19264b6aae30353ad2c78b6ee1cb44a48352bb73a3832a359522308fa929365879f0cf0a78a148e811e7f91
-
SSDEEP
768:Ej3/tPMqqFVecb4xMrxpaMBxu7MpXxzvnEaQ:WlPMqqLecb4xM9paMEMpXNEaQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 2304 msedge.exe 2304 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3052 2304 msedge.exe 84 PID 2304 wrote to memory of 3052 2304 msedge.exe 84 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 3252 2304 msedge.exe 85 PID 2304 wrote to memory of 4676 2304 msedge.exe 86 PID 2304 wrote to memory of 4676 2304 msedge.exe 86 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87 PID 2304 wrote to memory of 2032 2304 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7763b23e2c96384f340da8e57baa5d8e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34146f8,0x7ffab3414708,0x7ffab34147182⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15570608553905830086,10632808774229383026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
5KB
MD5aead585fd8e945c22c84d19b708cb65f
SHA141005c997cc6c13927f6e890c8931f522f162e55
SHA25696ae2fd93c941eacafc5b2944ac92d2b339e475bf83280eeafd053290bdb923a
SHA512ec6da07c30692ed32f7b16cd1dfc539c18b8f0a601239e78aeaf22241ad4831f5490c3548231f9f7138d79b82698bd86d5c795c3546fc716e9fa8c135f59ab70
-
Filesize
6KB
MD5eea5d9e161df90701ff63e6218e4c9a7
SHA115c6a2b264292160180a7021b16bd2b8f2fc85de
SHA2560bb2133961ea119b32bacc883bb01bdd16dc4073f1c5305719f6d669a5f06440
SHA512411a164c84e5b5afdf67935c6456108d5024a196e3a342e083f72e5da8ec58788126d6fe3e91d3061c68eadcfdc2c75aab858ba8f24a78ddd5dddc6027ae5f57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c2cd5347c9e50a903c521eaa2b242243
SHA13252959367ffdf88d1dc7cd836e60b7c28d6a539
SHA256e590f865ad7183f3a7d1881ca191f999f9141df68374a373a8e3ccd835ab2e1a
SHA5121df20d0e979919ccdcda00393fe2233ff0caa1a64ac24a64c229f850a305e582d9a07160d34200f6239716ec426702587f40987eda6c1f75786f0c760f8981d8