Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
46d4cad632a7fed90b2032e56d3d33fa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46d4cad632a7fed90b2032e56d3d33fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
46d4cad632a7fed90b2032e56d3d33fa_JaffaCakes118.html
-
Size
28KB
-
MD5
46d4cad632a7fed90b2032e56d3d33fa
-
SHA1
493d62c19607a3c7573f9e11d90c25a51b64607a
-
SHA256
354fd15d0ae217192180f3f08adb2bf02ad6d86f3c9df8ac02b92693fe04b6ac
-
SHA512
1bbb63101b3b390220404b4369d9a190c883cf397173fe815f3876a7913ba424a4c285541341ba3138c8c8c3c4b43039f1a1fb28addb6f788996c727dc0c5a63
-
SSDEEP
384:CDZqZ7zPkKY7DftB0abo+fRJhEGBJcUxP3+EjYDASRCv3Zhfn8lR/ktkXEWWVrVf:oZqZvtojYVCvJZEmbpOk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 2548 msedge.exe 2548 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 632 2548 msedge.exe 83 PID 2548 wrote to memory of 632 2548 msedge.exe 83 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 3052 2548 msedge.exe 84 PID 2548 wrote to memory of 1576 2548 msedge.exe 85 PID 2548 wrote to memory of 1576 2548 msedge.exe 85 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86 PID 2548 wrote to memory of 4064 2548 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46d4cad632a7fed90b2032e56d3d33fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e6746f8,0x7ffd7e674708,0x7ffd7e6747182⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1219025928967657827,2588696283564890966,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1219025928967657827,2588696283564890966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1219025928967657827,2588696283564890966,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1219025928967657827,2588696283564890966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1219025928967657827,2588696283564890966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1219025928967657827,2588696283564890966,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
256B
MD51fb9ba4bcae261f84a7d08a8ab121138
SHA1bd68b4cb6d76bbb8142c2e299de21b21fb964f4e
SHA2567e412defcc9e248f1b7db011ba8ecc12290f678fef97660157f17e2c4d86535a
SHA5123f86429f2341409cbea7f8241f3a0c268ee2f74bdab5cc5445572d12d0a7b867e2c96f3917f47698afe5acb0372f838e3f90db545309bfc9c8b34004819ada82
-
Filesize
5KB
MD5f9e4f6dc60f1b975734ea66bbbc6fe7c
SHA195c53ddd532c1de9d6e01ce121981475df2a204b
SHA256efe002a60472bbc5f90c1eeed68bfd24b73c3bf470609ec15e44942995534761
SHA5127df364cab891d1befd591142b2148f2e8729a911aa32a4eae7f083e3adfbcc2a536a28a576f14db2fd29dc13bcc6782caa70efc0a26034bf48e043141e492e7f
-
Filesize
6KB
MD5c022b7cf21b6ce1d723eded6fc2bbe37
SHA1e29e0aaaac72304e764bac349ee5f902d1073b84
SHA2569c09a6ad49b2ec4e7a08330e574d981e40b2f977ba18d8bd5e1807367ae49d84
SHA512c524276ee5632eb37c2c9d2f3a0ab2f1e0d7850454da4e74e8fd6f1c5057d52ab962617a923e299316e0c7c73be5be639890ac0e4d67b619e2a4bd0ed88ced13
-
Filesize
11KB
MD502a4c292d63bfabe98d5c1cef15d4514
SHA1fdfb587a8e0dc2faeb90bce22d6874f69762d34f
SHA2569f0b8f30de24223f58ca1473bea6cb7b182164023c78d98d893e07ab4c7ae629
SHA512bd2f8a194381893ee2dbad2018e099b792ea2b338a6a5407bfc678307afa9e6e4df504d44bec9fd568cb7da4ce5b0fd23b393706c7230ff7b79b62997a51f566