Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html
-
Size
26KB
-
MD5
489eb2e1926b4b7abbe42007643b14d9
-
SHA1
12f004716cb4867fd0707a8503881868f0a2c527
-
SHA256
242621afa520db3c30ca7c89762178180c838a2077923c01eaf12dc90928ca08
-
SHA512
f1293b76fe58e5ab4b5863c0d0c5a7e33bfe941f32112f694ccb18160fc7cb4ee822fc49e4c43c0362b2bba37023d424b584b8940ca7688a88a397995b475e27
-
SSDEEP
384:ipUaj1vb9iHdTJNHLAU2MpO7vf3VxaNY1/oPJQhnRHipZEW15e:ipUobw9TLHLA42vtxrQPJQJ1IfLe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 1284 msedge.exe 1284 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe 1284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4728 1284 msedge.exe 82 PID 1284 wrote to memory of 4728 1284 msedge.exe 82 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4404 1284 msedge.exe 83 PID 1284 wrote to memory of 4616 1284 msedge.exe 84 PID 1284 wrote to memory of 4616 1284 msedge.exe 84 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85 PID 1284 wrote to memory of 3548 1284 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e5e046f8,0x7ff9e5e04708,0x7ff9e5e047182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,3254171854143702635,5882364540049091771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD5500b99f0bec458be0f98a37bd9e4751b
SHA100a43c483fb6aecafd4c34368cde656fca36deb3
SHA256e14a934f6bb6adcaafc019bf62a18fda7633f8abd223b456e99d2e3adf2f5ae9
SHA5126ca453fae646196456babf36616e5742dab32a5d1ba858e5bafc60b5365dba03d9c64994354fbe30a10b30159c9a22e2c3325ce4c136d2f7a4c5d985ef525787
-
Filesize
6KB
MD575a2ae8f044d643341811bd6cb91fd46
SHA15064eff078d7d1ca35b8bd1735aec5cefea55ec4
SHA256266f69509a161535176b3848e9ebcd4e38b7cf1b028a9ef758a3f7a95808f9d0
SHA5121b92c0bd96cdd373a1b36eef4081203d4b6cb79ae0f6c89efc7f91482c9c27b9fd220f639b06f28d5e8960f4fa1a1ddfd1fbb691df989132989a073050ae9631
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD508cb29b72f6eac959030da8780137e24
SHA1a4b81c3b2d37613462e2581120a77ec3150a5adf
SHA256d2348bdfa5e685397f4581d755b948dd78d511aeea62a9b05a5cc8ea9d326123
SHA512dfc4255a2a7b01a691accfd52029290c031e9001d1d93558618a3ecd19a864f852c1170c823e09cc77ab8e9f6127621dc1e3c17973a0d11dadb39b8997c572a8