Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
467de07a11f711e53af845ae742a7c26_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
467de07a11f711e53af845ae742a7c26_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
467de07a11f711e53af845ae742a7c26_JaffaCakes118.html
-
Size
285KB
-
MD5
467de07a11f711e53af845ae742a7c26
-
SHA1
2298d0a87fe3d0c59077864830ecf11bfd10ba2d
-
SHA256
a0dcaf9b575c1ef07b64af6ca321d0bb5bf1027074b9dd0c00148a2a7512cbfe
-
SHA512
9f55b45d1b617b7c4511f0503a01d65844d4c390af00f5b9c2df7c69020a6f7597dd09195b25a226a05050dd626da0a37eb0cceecc8c9418a9257a4cf220d293
-
SSDEEP
3072:5sUnRV2a/NrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:RnNxz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 4912 msedge.exe 4912 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4956 4912 msedge.exe 83 PID 4912 wrote to memory of 4956 4912 msedge.exe 83 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 3584 4912 msedge.exe 84 PID 4912 wrote to memory of 1448 4912 msedge.exe 85 PID 4912 wrote to memory of 1448 4912 msedge.exe 85 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86 PID 4912 wrote to memory of 368 4912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\467de07a11f711e53af845ae742a7c26_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8a7946f8,0x7ffd8a794708,0x7ffd8a7947182⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14853952704434472592,593066551808278971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
616B
MD5001a6f202440f3622069205b97f87704
SHA165f23cf96ebf0e38c43cb78a1d208467012cf2ae
SHA2564fad54f460d0c1b99206c145fa72172a9520bcb509e6c378bbe40c51e2cc6e22
SHA5126b832209fac3c3c33f1e390b4da4cf6d277859ead870ce0f59ee322397481ce34e74cf6ff4a20a222babc0817e6e5dea1e293fb3dc1e4f80bf143300aac7fe73
-
Filesize
5KB
MD579cdd549f7bdbac8155de7d9a8148449
SHA135c1594d16bbb95213998d97c18414a59ac135cf
SHA2563583547298514aaf283f371ff26417b1c5f78dbd6e52014a9cfec1b0e1047616
SHA512cb4fa5e88d88faf4e185c5af22b2a99f339cf773fac895123b736485aed44d2ff187a1b49234ec26aee416a218b9f0952f13c7b88d94d8c6e70d8dc0345eca98
-
Filesize
6KB
MD53cda8492b0f96a1bbe31f169fe537e00
SHA117f647d570f7a2a62c63057883604325e2816380
SHA256bef33b875c1be2db4ee92441c18ae58b14d3f1b5c1645ea08fe43908cd5edc93
SHA5128cfa329b029d1e2233bfbf4a9554fd5ce8d3246cf854f739d2d8ac4f3e23026842e9533def8acecb7c79f6d348551873915386bfcdaa1e349fddfd5dce6c070c
-
Filesize
6KB
MD5e93e2c69f14aa04a6309fae855465093
SHA13357dc56c5c4c36f44c7fddec26bd27fb863b937
SHA2562f53e3a33d2cb828864e6d0c041178327a26565b21c8f178a3c99e807b9fd74b
SHA512736c86c1646464fb08764d9412f57be3d05f61350959e10fd4525e1cde5312a23c00c15ec444238243bc67a7f91bcd72d9eed32fd8f8a2b2f7c752bfbf9c5bc5
-
Filesize
11KB
MD548249c0a335d2a411732351a946b193e
SHA1854d7109469bbc734ca24cee90fd01ec1bd29903
SHA256d322ded62dc24f9ab853499f962c67e02c2e3baf59758963d3180068ddc1546c
SHA51213ee8b2e51c9d7bc40abd1f37c5f45bddf9977c613d49532c7003685203d29e342e250436b30baadae51c695cfc26e74b5250c4f545188a0796fad3b5fdf9adb