Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
48887cd949122e6bc1459d6534a0b8f8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48887cd949122e6bc1459d6534a0b8f8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
48887cd949122e6bc1459d6534a0b8f8_JaffaCakes118.html
-
Size
162KB
-
MD5
48887cd949122e6bc1459d6534a0b8f8
-
SHA1
84ab8421f489f29069a7e08defc0dde994981d34
-
SHA256
dc5f79a9a0c43f1922ca45a30e924a9b7f686e7bfee6075a9976e1c54f6cc956
-
SHA512
09240ecb509b7eefd4819c195a580bd260215c9a1da466251b4dba49851185f243e519d60d1a9406888d710327d125fd6e32bc1d64f569e9db91e4b39ed5ba79
-
SSDEEP
1536:ijRTlEK+dsnBJyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iN9BJyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 3576 msedge.exe 3576 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3836 identity_helper.exe 3836 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 4156 3576 msedge.exe 83 PID 3576 wrote to memory of 4156 3576 msedge.exe 83 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 4816 3576 msedge.exe 84 PID 3576 wrote to memory of 1892 3576 msedge.exe 85 PID 3576 wrote to memory of 1892 3576 msedge.exe 85 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86 PID 3576 wrote to memory of 4924 3576 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48887cd949122e6bc1459d6534a0b8f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffdf846f8,0x7ffffdf84708,0x7ffffdf847182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3253467067494577945,11927434642278255786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5f93c83385b4330551063635f4f4ff4c9
SHA1ef34786431aa0f77bb520355ae9ca7736c9b8d7a
SHA2560d5380a49073eb85a57ef6268764a7fdf1add3fc15fa3cd1a1ea262596e7aa78
SHA5126cef304248e5b1aa9012d54fdab99e5f5fdcdd800e6e586a79267ce0d50ae3c66a39cdd9f6895baa2d68fdda305dc6033ed88e158c65477e5392afad8a153a10
-
Filesize
6KB
MD5da3c69bc92baf485fec10b68339ef56e
SHA1279e7c3aa0a11a5e39ab1a2709bbaa27a6bc46e3
SHA256ce6dbb8d7764688f8c140c405f9aed712a7e78a8dfc64293fd015be97830b973
SHA5125b5b1265df943bb8b24630fe38943425f852843a97c4a4164b372e0bcd0dadac46f34994da25aeee527ece7ea53e17bdfe4be74a653914c19565968091cccf95
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a98b524bc72e545ee4f64a34281b21d6
SHA184df85f9216a44e71fc5bc91afbdc6b85a85d97b
SHA256180abaf9e015abc1ff61f98bd60905e9b2d31388dfc6917d10096869fc2e47d8
SHA5129bf165bf4313585c1b428b8c5d274607446ad363f20390d650a6f86c095efe8decd994a04ffa51dcda5d5389400cce436f2ed4e512eecaf368dfcc6302bb25ee