Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
46661acfd579cec9397c7194dac950f7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
46661acfd579cec9397c7194dac950f7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
46661acfd579cec9397c7194dac950f7_JaffaCakes118.html
-
Size
10KB
-
MD5
46661acfd579cec9397c7194dac950f7
-
SHA1
c145e8dabc48548a942eb569f2e99ecb97223134
-
SHA256
614f6af619b2ac62f92af8c392cb0f3e78eb2806dcb8c30d1fd2a9871ed0013c
-
SHA512
aedefcadede2f2ec95922f641cc0165282003b73f6523faadea337a4a79a45a407b35a15c7bff8e65686b81eb26fb2e52fe7e6a74c56ff92dfd745dc63366641
-
SSDEEP
192:aEql7vFZ7vUqfBWR8biACAF1GAufxJzdy2ebqmkOPwOXirnZXIuAeV7:KfaFACZAujz42nmkOoOiBB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 1164 msedge.exe 1164 msedge.exe 2312 identity_helper.exe 2312 identity_helper.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1164 wrote to memory of 1388 1164 msedge.exe 83 PID 1164 wrote to memory of 1388 1164 msedge.exe 83 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5080 1164 msedge.exe 84 PID 1164 wrote to memory of 5032 1164 msedge.exe 85 PID 1164 wrote to memory of 5032 1164 msedge.exe 85 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86 PID 1164 wrote to memory of 3860 1164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46661acfd579cec9397c7194dac950f7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc468746f8,0x7ffc46874708,0x7ffc468747182⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,307539913568595929,6480826782895193627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD50888b0f6464939e585e99dd403a30f87
SHA1b821ca3c47272a73529eb701559f80b705d0b754
SHA256b66bb61fe37f540b336ac3ff8c379631c7e38c510c291eff42a401e56dad7c22
SHA512dd792f56457f0d1966871abda9b088fa78bb6ec0f0b17db1ab29412098a40fc1b2da98637d2be23166a27d4b6662c41cf2039aceb98d71ce41aa7ef040d002d2
-
Filesize
5KB
MD56c8143eecbc9a1df5e1d8129ca058b72
SHA185216d5e819ddf868150af43087fe62336666362
SHA2564ca099048f8dec5bbcd3bc96f71ebb6eb20b35ca18f8c6410b01188a87ff33c9
SHA512391f2e59f8feb37439fc4b7bb2110debaa3133539b7e3defc6688e3873112e8fe89cedbaba3608d48ed17f19bdce5c792b6818881bafedec104e344edd7fc9ab
-
Filesize
6KB
MD5fc1522971c9d8e184639655e16598b3c
SHA1f032c2e4f6eee323effa2f262089675c0ef16ef5
SHA2563b954118bae10277eefe106dde603aecc9b682b9581aa36065011998d421c853
SHA512b85b35d508031b080bcdbbc0fd66a45f4dfd61806a6c9dc90335448080234f60f8ff4fe6e3c31660109f7c67cd0d355e243df84f61db6d8e62aadfabc2792539
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5edd471d65fc57c226bff1556a13a6b9c
SHA19eceaf680b59012e98b360775057af15dff2af5c
SHA256e8a80a4846d1e98b05a580dd8084a2d04ebf27c6176dcd0065104b3973e9b791
SHA51254321a5eae1709b3c015fc654e4bf2004a84259cfdba3aa66c2c2dae8890bb4b10f1dacb213bc4b6dfdcc1702e3a36a909affda7384f31f994996e797727d41a