Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
458fc4bdc675878c41a0243b63b2f254_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
458fc4bdc675878c41a0243b63b2f254_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
458fc4bdc675878c41a0243b63b2f254_JaffaCakes118.html
-
Size
36KB
-
MD5
458fc4bdc675878c41a0243b63b2f254
-
SHA1
d23807c647ce4bf5c23e3c73d54b1691f984b1ab
-
SHA256
b3e5f473fd4c8f7fb1df05ca90fb833402cbcc3c44d7408697fcea0fc19ec723
-
SHA512
b8654b41024618e6d725bf868dcc3afa32a8376b35f4626c7e964a56d1c2a226180e01206123a6c13296149ff7b29ca93e05b0ea6f995836eda22bac7afff11b
-
SSDEEP
768:zwx/MDTHqc88hARwZPXzE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TmZOb6f9U56lLRl:Q/DbJxNVxufSq//86K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 3776 msedge.exe 3776 msedge.exe 4932 identity_helper.exe 4932 identity_helper.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 2836 3776 msedge.exe 82 PID 3776 wrote to memory of 2836 3776 msedge.exe 82 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 2348 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 84 PID 3776 wrote to memory of 4844 3776 msedge.exe 84 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85 PID 3776 wrote to memory of 1136 3776 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\458fc4bdc675878c41a0243b63b2f254_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,16214118051119977524,6676459322096270183,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
614B
MD58a093777318c325ad081c9032c377f5e
SHA14dbb93ed368a8ca826527134277bef946233bfbe
SHA256e9653c74bcf3d02160c0fe09389c7a5285f9849507a1b04df6ad1b03edb032a8
SHA51283623a4718b5344a2edd983e7f1c4a98b7bff4583baea611abe6d8b18fc3e414ad690a2f2a7043b84f33ebae79a40653b5d422c09ae99153a614be77b550fcfb
-
Filesize
6KB
MD5d1afe4fe7a6d494534007dbe5d7fe742
SHA1bb8902de25dfe5c3c93ca4e6082c205e776950e7
SHA256e1b5b37a6875047c75912641200969f325d3670186e92b671f916ea387a0d61d
SHA512f32ec84f54fe562a55041429f2335fe56505747f7efcf599d9e01fb6130f2279bb2c56471e0a1126044ed89d0fdb63a15f364caa9125edc9add1be5f712cedc3
-
Filesize
6KB
MD5154df8021367a32b2e84fc51a8bf68b5
SHA1255f5f4016d56d9abeb72f94776f5124b16be2bd
SHA256c83e5777d6cb73bd59e5197f595cef774b960a8840fc6088815db338f25d72ea
SHA51249a90bc6cd0877fd410b385ad1a069b3d185b0b237300ef9d39d95649d8919d35bf3ae64cb123a4e2ac419fedc56665b6a432f3cdc5093f986c3c435e3fda0e3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a789325df3815a5e7f86b40b71ac93a5
SHA1f03d943fe7f0cbd9640d5cff7e51c071994b0ef4
SHA25635e3e0af68419c5fe3f05ee36c2174818480af88b1f422d98b0382219953e321
SHA51247abee8cc074f4269cb24631b12657a793b3eea08992c02efdc767dd8e503b376f7ff4432576a0bd995789009cf172f8c9f275878d3c81dbdab22f243ee9bbb6