Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html
-
Size
68KB
-
MD5
458081a206a0c5f465cf2ec0919e45d8
-
SHA1
d02f6ce36417d067ef7f60ca5a64eb413e492faa
-
SHA256
c721ce5143ed9fb1d44c9ac5085a3b3ae6e279a1a938779dd3aac12fd21834ac
-
SHA512
127bffc9d1cc7ae378a81c5c5ced2f5afbe89e71c52205b5ad62aac1e93a970516c8c1be258c591cecbfc26e5b8c7c89d10bbb8adf025ae38cadfa1ff6d4e9e6
-
SSDEEP
384:hdvXw4BMrkOjOORX3obvuqAbO/DiS/Mf8PypfcMzRWgJOca0j2rwktNnW:A4CN36vuqAbO/V/Q8PjYWmOy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 1180 msedge.exe 1180 msedge.exe 2096 identity_helper.exe 2096 identity_helper.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3652 1180 msedge.exe 81 PID 1180 wrote to memory of 3652 1180 msedge.exe 81 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 4688 1180 msedge.exe 83 PID 1180 wrote to memory of 3424 1180 msedge.exe 84 PID 1180 wrote to memory of 3424 1180 msedge.exe 84 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85 PID 1180 wrote to memory of 3100 1180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\458081a206a0c5f465cf2ec0919e45d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986b46f8,0x7ffe986b4708,0x7ffe986b47182⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5703416665004573577,10554782963358859487,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
184B
MD5bf47a61009321e081f3babde283f99fe
SHA1a7673f4818328cd610d01b0bb126537acc958abb
SHA2567f61221037811fadec0a921926afa442b9297cc28d8b1977cf731e635b6b5ac3
SHA512fd2f121921460af2760ded863c404675616b771d43869d966e8804cda531bbe2fdbaaed57ca8bcd7ba8756608f585787852d2bddbe7ccf25a5a9be7c1c366e51
-
Filesize
6KB
MD58c4c0863774db26b4a7a0b29584db638
SHA170987baa74fc4b4468b64c9784eefedcc4e801ea
SHA256fd8eb790b510a5d0e728e83d9a892e7a651d69f24e6cbeecce48c161ad0f2db8
SHA5126e633ba0ade2017e4a9d20379a6ace4e7e8e719dc6f9c943dd75a6f6c23703b7e28614585a24add17c8d0845b700530a743d263e2062ca5a4c3c39e4089e6082
-
Filesize
6KB
MD5c43c870da049df958234570e1076e822
SHA1b4bf7f218d4c1cdd5e1b6219352e7c04001e9d8c
SHA25625a64debac36c5cdee6051fd33b9887630a5226099821af5a6ece1851066f19e
SHA512eaf8d5a69fe337eccba9cea9daab78f1b91a11ee0ff251660a54a7b7a8732138e654fe458116115a137171ebaf5e04fb4fafe7f9113086957c789fec2b33b152
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53d568f5afc4e168e7d546f4886ba8451
SHA10ad8e2860db410faefe709626ac79cbe966f8b4e
SHA2561f8f7a0005ffe00f9eb55571fb936b80591e4b5609e5499703fe1184f9e72f0d
SHA512779e5fdea7083729137f6748030acb1c19fcfca813232eea0310313dcc0c951d4f597955534a89a01c0c2daddf7885738bed253f9fbe66085f61b91be7745934