Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
4250a14eb5aa7941d883a006ac3c6000_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4250a14eb5aa7941d883a006ac3c6000_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4250a14eb5aa7941d883a006ac3c6000_JaffaCakes118.html
-
Size
36KB
-
MD5
4250a14eb5aa7941d883a006ac3c6000
-
SHA1
e885fa104276caf8ac8ebd7ce0d8b4084b3ac802
-
SHA256
635dc73aa988337221e74d52f9566b5e87eba5b393e61db90bc478ff0d986b46
-
SHA512
817153fd6c359ee0c701cbdc62a8c6e8a738c8576d75dd12898733a73b7ee4148b370ba3d8457567b20300f8fa57b3a8af92c2d6275afc202c9a58b4c585029c
-
SSDEEP
768:zwx/MDTHP388hARwZPXvE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TJZOg6DJtxo6qL2:Q/jbJxNViuCS+/E8DK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4404 msedge.exe 4404 msedge.exe 3648 identity_helper.exe 3648 identity_helper.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 2128 4404 msedge.exe 84 PID 4404 wrote to memory of 2128 4404 msedge.exe 84 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 2884 4404 msedge.exe 85 PID 4404 wrote to memory of 4792 4404 msedge.exe 86 PID 4404 wrote to memory of 4792 4404 msedge.exe 86 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87 PID 4404 wrote to memory of 4180 4404 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4250a14eb5aa7941d883a006ac3c6000_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3166424837720015474,7609131445581986493,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
613B
MD5d05b6cf581360bd2f36b136bac4545d7
SHA158f430fc066c5893c188d70546fb50f4387e2876
SHA256e8fdb408a7225c5595b816f58bdc5427718460ad27143febd9a1ddf5d87ae25e
SHA5122c977b6d0d5b31aeda1e2c569d2b6867e4dc9fa34dfb847600b9158c863732aa00e5849c030b47596610f3231cefbb3c58c55d110a583a8a0c51a3377d47b317
-
Filesize
5KB
MD545628f0d6f2776dede2b789befb575d1
SHA105cfd710808f503a6dd883ac2e1fd62465398550
SHA25682592adcac40c0c0cd10eed90d36604bcfef32c92b3c2994b516c4cac18ad915
SHA512043b0f3f8ddb857247601d69b2aeea777c0b3bb57f17c09032a4093e13927cd54bcea43d18ea0dd50db58807edaded127b585f104046f524168c1fcd1d8356c0
-
Filesize
6KB
MD5992f3c5e4ae8546d9d85af83eae44b26
SHA17981c2968b636421923a714991c11af066397e27
SHA2561069bef110477a63ee71979d021dfc04b4167508788bdb34e3a47e238ba3b94a
SHA51204aac93c835c52d0bec1d9be01a9a73576e6361dc16f0779c3fec28db859ad7e7c2096a518dcef853c02dbfdf6aa68c8aa799344fe0aad9e3cfaa473a9119236
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5823b308a5e27040cebbb388d3f702b52
SHA1dc81b05ef34f1e1f46d0fef92495ba2fad17710d
SHA2560c8544517dc4f277502f297bcc92431f964c7936303c0cc0a7eccdf63569bde7
SHA512a6fa4b4579ce045401c27a2e4fc3706a494af3e6dee07f09dbe1bbb4352e4e1faf8881548d1926ab06916831642fcb3212322e4e05ad2c9e2bfdc54965e83eb0