Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html
-
Size
461KB
-
MD5
04a8268cd4a5a17ba05720d7b42f5447
-
SHA1
764ba57b145fd3ee9033eaba79d33abdd8eaf0d2
-
SHA256
5a15d78d22910bc52a0976d002c71fa64bcd9edd1160c13289e3e719a12ba1b7
-
SHA512
397898000b14a989f815443fa7554f5d12a4f27f9fd211f28fc7e1dc683504c9d80fb40390a0f1737b2a7d6d8b78465a3aea09b43c015054edef6a354dd7c34e
-
SSDEEP
6144:SQsMYod+X3oI+YMQnsMYod+X3oI+YFsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X315d+X3/5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2312 identity_helper.exe 2312 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 5072 2144 msedge.exe 83 PID 2144 wrote to memory of 5072 2144 msedge.exe 83 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4912 2144 msedge.exe 84 PID 2144 wrote to memory of 4904 2144 msedge.exe 85 PID 2144 wrote to memory of 4904 2144 msedge.exe 85 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86 PID 2144 wrote to memory of 4492 2144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04a8268cd4a5a17ba05720d7b42f5447_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc041c46f8,0x7ffc041c4708,0x7ffc041c47182⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9041640409062544223,14384186499396560447,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD564e9e170f087677e9767707d41896e65
SHA1d02adec4f3f288f9e2a7f05f47351609e7385318
SHA256d2fcf91ac4aaddc7c5a08607368a676418161acafe028a5fcba62f3975116144
SHA512f474fce1de642d262e12502f50f845d89b9e24fafd51a2feafc306055d58af24f690c45c58a2630195f0cef0ef1af95431a320526021409d3600b8fe3293cdab
-
Filesize
6KB
MD54ceb07895cddf81cbd012bc7dd962539
SHA1a5bac96d6c4a352d9b184a5c3801da9d77b1b653
SHA256fc1bf08cc0138f15612dc165df3185e8c226ad01d5aef6d52822ae89f5bb9495
SHA51262d98a581c028931a2b7391cb9527e614df36699046b016e256348d70dccf6f1ee91680023c9a8742ae613839c5d6d110c1124dcf176ed539be2ccccc249bfa1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5858fdd4576e92ba704d2a1a3c4ab0742
SHA17a0b5bf8f22e02cdcaa4b8a68e7909ad3ca2b1f5
SHA256b35e96f05b172bb4b76c772e1ab359f2c8c32fadc1b2685827418664d7e35398
SHA5127d4b31e579517d1bea8e17ea343f6a13a5e14f438ff40689c6676b25dd1c60976a723fa5516b29d3a987c5cb1522208d837479b24e0d8b092443d7bbbe945262