Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
4435014559470de0c666033ae7b4504a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4435014559470de0c666033ae7b4504a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4435014559470de0c666033ae7b4504a_JaffaCakes118.html
-
Size
59KB
-
MD5
4435014559470de0c666033ae7b4504a
-
SHA1
646f61495b2478910a879fb82b25a51fce75008d
-
SHA256
7395631d475ce0e249466fc9a465d3678470d6d002b1c6caf49baf3a507f233d
-
SHA512
55375ba8f90c338e0a7d5ce9c91edb5a1a53643c9a6695ac86e9599e404dae9b65751194347a856d35eb3f907c160599388b95239a2a562a2c4d2438e07a00ae
-
SSDEEP
1536:8RZxAsIib8Kt+Wy9a3umloID/s2cCdJxP:8RZxAsIibvt+Wy9a+mloID/slCdDP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 4216 msedge.exe 4216 msedge.exe 4364 identity_helper.exe 4364 identity_helper.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3764 4216 msedge.exe 82 PID 4216 wrote to memory of 3764 4216 msedge.exe 82 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 2792 4216 msedge.exe 83 PID 4216 wrote to memory of 5104 4216 msedge.exe 84 PID 4216 wrote to memory of 5104 4216 msedge.exe 84 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85 PID 4216 wrote to memory of 516 4216 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4435014559470de0c666033ae7b4504a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8795759387182405986,6955882558274019333,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
253B
MD53e912d015e78a6c233b18f89a5236cbd
SHA19a00d181c015d1bdf62678be17fd028fa0892757
SHA2561bcd3970fbde7cc11c47245146ef31b431a303877cee9528c49e9b22a6a020b8
SHA512dfb8e49e84e6d0fb82be04a72911d4d35591c7c0c9e85f7a0369ba69420139b88af33f3d83172660533d46556cf1e66725af6a8f8efaacad16263e09a4c946c0
-
Filesize
6KB
MD5b3cfb1ada8e474a844a8a90b11f28f8a
SHA1739e78a37b615582ed5f612bf8fd65744ae0cbc2
SHA2569e053fc05af6e99c1ef055a60acd80ff5986c0287ae679a57816386430e097d2
SHA512e993c2ee3e2fb347a010a421fd871016faa62ce4e7cda410c75d5856bb07885afcf486a2d8642bfb6583547bfbdd5598bccc4a05e7dac6836e4620a5f9ec5069
-
Filesize
6KB
MD512718db1a04dcc99caf5007fee1baa93
SHA158851b39ccf86ebd9381444f17f9423010ce3c28
SHA25679ee42400b6f2c0c8e20d68c2c21a650fab89e8ded184a47c86d8a93b1e4c3f1
SHA5129c30559c93a80f5c1ae2a5db8c7cb27331db2330ca5cc7772ad1b21c84e9820b6aff89f5b8344717951d1791310a81896deeadfe188c7e2edab8499d3b837d65
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD516f7fd15614cc01fbdfe1e415a7a3374
SHA127fcee358e89a3fbe20e020bd326640f844d0a1e
SHA256d16b60685ac56721961688fb2fe1367e93e00f2e9a78b3ccbfc0b2fe5b198c2e
SHA512cf775bd0ff14a7d7f26feaa98085dbca361c15db631a171e8fea27cc91be754515fc6a9555f4c61169b5bebceb054dd5c8b67b070d7524c2720e58c346111ff5