Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
4845c27877789abeaba3a399b7ae0fe4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4845c27877789abeaba3a399b7ae0fe4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4845c27877789abeaba3a399b7ae0fe4_JaffaCakes118.html
-
Size
4KB
-
MD5
4845c27877789abeaba3a399b7ae0fe4
-
SHA1
6ef69fa219ed43223741f862a9fa54a08460ae98
-
SHA256
5c2369ddf859754ac99ae6e39b231e3f1d9fe44926bace86877fd006a7b27172
-
SHA512
23e558e929e3ff9bacf937ccb18201fc6b5ac70f9381fe2f68ac8dc3d7eed2d24c48f00253b30bb5502eddd7bf16cc1edc262ff7112e4748349cd7f2873d288c
-
SSDEEP
96:9ubzlzlzjzp5lYl5L8hYTTlal5LqhYOEtEnKjFw66F:eJJ/dbYlEYTpalOYTtEt66F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3828 msedge.exe 3828 msedge.exe 3892 msedge.exe 3892 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3892 msedge.exe 3892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3892 wrote to memory of 1168 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 1168 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3760 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3828 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 3828 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe PID 3892 wrote to memory of 5008 3892 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4845c27877789abeaba3a399b7ae0fe4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8cff46f8,0x7ffd8cff4708,0x7ffd8cff47182⤵PID:1168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,6085439160182616595,7852698800883257741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:3760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,6085439160182616595,7852698800883257741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,6085439160182616595,7852698800883257741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:5008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6085439160182616595,7852698800883257741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,6085439160182616595,7852698800883257741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,6085439160182616595,7852698800883257741,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD59ede8591e2e10e622e3950fb7c68ab3d
SHA111840324d431468e8f8e9f7686ff7cb2af12af60
SHA2560e8b44d96dba47123194fb82d56aaad9a7173baec29e79651571a0d885057e9b
SHA51247f28daea78a15b00ffdfbbaeaf59ab24aa63b5084b7426083082bafdbd0582d644a65ebaa2f94e69df6f8333c04c3e473eab2ab4207637386190e80be50c9da
-
Filesize
6KB
MD55f6688f080eb3fd0eb47d4e49875f5c7
SHA16ccacb69e78c611ec731832baf4f2b8d33ddacb7
SHA256226dc51b847dacb906a78602f11cdf82626f1d2b340652392ff2c95cef6fd8dd
SHA51215534d16352ce76567441bc00f0c4568961935d621854ba7162df620001300aa66924608031157f2a3e77bebe7f8433420e8279a3af251619307631c2a0afed0
-
Filesize
11KB
MD5662ad01d3252aae23ccc9b7b0d423b5d
SHA100c0672cc8669f4752ece1470013fe8d590aa490
SHA2568b8f0e1165804b142b28c6e88b5cce72d55d99c2b8915797a4c1662f8cd84395
SHA51264596aff00177197638fac9e385efb4469e33bc8fb38ced0fda2c15a5fd40004d48430e1b9b91bf783e1d8cbed36f911436f15a9fbc120f0ecda2fb8e94ac2ef
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e