Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
4622ed8e94ecc48b8c736b2df6bce901_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4622ed8e94ecc48b8c736b2df6bce901_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4622ed8e94ecc48b8c736b2df6bce901_JaffaCakes118.html
-
Size
826B
-
MD5
4622ed8e94ecc48b8c736b2df6bce901
-
SHA1
0feebc5e9f012740e8ba4134d820d9fc35bb1873
-
SHA256
a6cc7c35dffae8f220c531bf8b034e19b6ea25b470badd7f3767a1c0e023a737
-
SHA512
034dde1322aa427317ecd71c0a3cb8d8748e9d65207b2e92a1f7287a2d7e7d58480a0a9d98ece2b6ccba8686ea33bc315f36d03fd70a61cf4011819f235e9d50
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 452 msedge.exe 452 msedge.exe 1612 msedge.exe 1612 msedge.exe 4244 identity_helper.exe 4244 identity_helper.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 748 1612 msedge.exe 82 PID 1612 wrote to memory of 748 1612 msedge.exe 82 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 1584 1612 msedge.exe 84 PID 1612 wrote to memory of 452 1612 msedge.exe 85 PID 1612 wrote to memory of 452 1612 msedge.exe 85 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86 PID 1612 wrote to memory of 4168 1612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4622ed8e94ecc48b8c736b2df6bce901_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2328 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,6992578723396250663,9355999672791289106,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5d71fd47fe01dad0be72cb387cb4b9374
SHA19beaa74ed1604c89f2791594e4536e69ac48c8da
SHA256d5320e2fd964d263188f8162ba2875bf73e39efc33c874b2e950c680d4c2409c
SHA512b3a155191bf43c31c6ae15dc7e14b5d14cb009e2883a2836d6acdc533d85ce38f24925383cb50a966a763f3bcc711a57364bb627f93821b149955bfb834f28fb
-
Filesize
6KB
MD51132f053fba35c01dca882e0b0f36ac6
SHA1896571566b54db1ba8fe3d422dbcc50ff552fe3a
SHA256a0a7beaff3c4bdb240b434ba045c5566395c7eea7f8a4dd5ba53c1099795fd97
SHA5128eb4bfeb3722edcb32d69475e4e494ed10b141daabbf8c10be3bfde969e5df4c060fd4c315d87f38d76d7cec4436ffdc12aa3bd64b9f325cbd3724e3445e33ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a44fdbe2788ef8ae8cd4291d5b96ff1c
SHA172b9771ddc23c92700c16e440ed3053fa912545b
SHA25602be9c46fd1458078b3e16107548617fbbe7ea8b65b42f80f9e95671e599c117
SHA51220cee8a133819d4666edc58407b3f40282c5d84d22b2f043eb9eb4ad12fe90c8bc51674fe58699ab3cc6b540a43fbaec52f3a7486b60abf0e6b015d3229bbcf1