Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
46496ff7c5f5056be0773a1b2c5488e3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
46496ff7c5f5056be0773a1b2c5488e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
46496ff7c5f5056be0773a1b2c5488e3_JaffaCakes118.html
-
Size
41KB
-
MD5
46496ff7c5f5056be0773a1b2c5488e3
-
SHA1
27dfa27bdfabe4d3da679108c0d822be1f00dcfc
-
SHA256
27f1b48a8ff574ae42d02e8551cddd39b897c69eed7a721823c3926c97c15c20
-
SHA512
b4c4dcde976a852a49447fb840486cedc998da65a06db329be2572f1792b9252f9d877e1a40718e68b770a0c28cc78e87eb324e347220ef3089c0fad4b3733fd
-
SSDEEP
768:290qJGRcC3jIwa5CuUnnRp0CthhN7EoJ4uz4JqWEFz+tsAY5IC1Xyd5jOcdS5300:2ZGRcC3jId5vUnnkyUwMcObR1E3jEjFW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 1488 msedge.exe 1488 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1476 1488 msedge.exe 82 PID 1488 wrote to memory of 1476 1488 msedge.exe 82 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 1624 1488 msedge.exe 83 PID 1488 wrote to memory of 4860 1488 msedge.exe 84 PID 1488 wrote to memory of 4860 1488 msedge.exe 84 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85 PID 1488 wrote to memory of 3700 1488 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46496ff7c5f5056be0773a1b2c5488e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe410b46f8,0x7ffe410b4708,0x7ffe410b47182⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17159713838732193505,5077361636957080510,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\638d1901-c4c2-4a95-ae41-a23adb6b11d5.tmp
Filesize6KB
MD59209f20dfbc8fc067effd13fb670cd8d
SHA1a7e644778af66511d74dee61bc3306f5481af4d2
SHA256d6d73d2097a11dc44da12ee920ded823f86926f4432bdcac76d435512082a64d
SHA5121353abf60f92eb7447d2640c17ad00ad59369d45b1a695c61f0154b4a119727cb52f5987e7f4f161f591dcfe33397390c1997619c9c38ea168e5227000e65409
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a4e9dc203b2b696ea12dc587849739c5
SHA14a1c488b2b89237a735ca24038beca0879ddd46a
SHA2564c7c47c7a53d65f9a729a63becbe859ae4c4383e3078a2b5ae08831784b41c68
SHA512e0828ae71b5f1eef10f73cda697f6df3ca7c748cfe590cdb0e2f181543e403aeb34cca55d01bcbad6793777f4c37120e3b6132062cda40a43240fa38084a5848
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f8e8bacf-1df7-4542-935e-782a93ddfe54.tmp
Filesize6KB
MD5905edea6f137ecd80d5d3afd51b65a2d
SHA1e00116d1cf08e7f42c75f1bc40bc9bdc00f9d7d8
SHA256014751b91053291e11191a30c1fdb39b6a1e852436ce0c0701736973c25c3cc4
SHA5124026d93b0c56c1f5d849133522dce58df4dde8743d40103311669fa538c7fac00a833debd83151a4513ae8aee10922476913d00699c8ae86657674a0ebcb00a7
-
Filesize
11KB
MD5a9ab0f64d2728e7177ba2fea98289d01
SHA1cd6c363877b5a8ea22307f16d074982f70eb8f47
SHA2560d1185bd2d13f41d4583f1861676c9f62b2f98cbcde160f7635c10e9d39d68bf
SHA5125d982441fea8bc50dd924eb5bfc839ee7e5c8dfa8dd1b607153cf952e142343703f96bc1eecbad7ed9008e31c43443971db18c048e7f44620a1693c11777d96f