Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
404beadcaa664dfb98cc09e41ab25dd8_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
404beadcaa664dfb98cc09e41ab25dd8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
404beadcaa664dfb98cc09e41ab25dd8_JaffaCakes118.html
-
Size
4KB
-
MD5
404beadcaa664dfb98cc09e41ab25dd8
-
SHA1
db95488559af723aca1752edbd2b85c64a614455
-
SHA256
29ccb2a24a6d588e4db018c7b8de0e9af79baa67955b0bc810d61f6563bd44fb
-
SHA512
0f050cb3101615cc5f81fe0cdebf6b19f416a6f9c3aec835cdf7a97f271cdd4469bf6e10ff9d0fcfe078df0aedb7be85406aedc13e9742cc5ad248b000495847
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ofj2td:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 1008 msedge.exe 1008 msedge.exe 3736 identity_helper.exe 3736 identity_helper.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2836 1008 msedge.exe 82 PID 1008 wrote to memory of 2836 1008 msedge.exe 82 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 536 1008 msedge.exe 83 PID 1008 wrote to memory of 2656 1008 msedge.exe 84 PID 1008 wrote to memory of 2656 1008 msedge.exe 84 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85 PID 1008 wrote to memory of 4052 1008 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\404beadcaa664dfb98cc09e41ab25dd8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14165899477487003948,10600013070246216870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
292B
MD573b966936f5f5aafd77d53afd35d0475
SHA1ce45e4aed784be10669f3002c082f9140f3df27e
SHA2562a293586e7cba520972128e2c7d193e56b5f3f763ad6e8c080104f26787ef2e7
SHA51267889b8f0b5164a1981e2b4c18d229bb50eeba49b269767f3d3608c83f779443160f3e3cda7242528fbbc8a0d17940f9c506a4d612daac50feb3273552ad0f94
-
Filesize
6KB
MD5338824fbf3e8bce2e31bfa69039c6ea9
SHA1c9e9bd380706c984fb9f7a46736d5dbad6ecd8aa
SHA256b01e8ec001a2ac1aa068b3fc818c8f3bdf45c95ded8e5990fa187961e97be3c9
SHA512d6032ea266b0d68c9656688dda8c8887fba9d33fbada0ac222c93a8294a40706996964c6185ade581730289abb7a72b77f441b2e1f6030dc124cc6c77e0499ad
-
Filesize
6KB
MD550cf05a49ab7345a8785c5e1c1099fc8
SHA17b0990decef60c3efd86d17394f9ffb4bd03f18d
SHA256a158c435b9a78c86bc44befe98f36fb0ff50954f0fd3087901a5757aa2806b33
SHA5123de09c257d3115d2372a444c8ecca7440c00b7ea9983a30e72c3cbaead0822248fe83dbaf67d3b50799e1861fe8506234b277b981d22908bfb15c1bd8bc45cd7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b4d73de73609730c917e39a584b70748
SHA16330e6ef0c319dde8a5e0a33d7daef36d8fbe76f
SHA2567865b8e23de7c1b6068f162645c8a2f509e2271357a9280189169559d816db5b
SHA512b75490d49c4b32be8f45d32190e85bcd48cc721b62c6ee69b0b766c90a63e6d62d58b7385f87eb2188fd6dfe34399fe64452a4f2aaabb35d53c8c00e8f1e76ef