Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
4778b6273cf5da73665ad17d8d728998_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4778b6273cf5da73665ad17d8d728998_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4778b6273cf5da73665ad17d8d728998_JaffaCakes118.html
-
Size
3KB
-
MD5
4778b6273cf5da73665ad17d8d728998
-
SHA1
6ac35d2192b5ddde09b2feb08918e4bdca935937
-
SHA256
5c7e1f4721b99363c67761f223b50d9827bc1793d2d564fa9695e930ec030963
-
SHA512
68ca65c4318de037519854599c2b7ad9ba5d75b604b78538c7da6400459485259509c0f5608dc5d71521723a9969252263e60410d212c70fe7c655f293b1e7f3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 4160 msedge.exe 4160 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3896 4160 msedge.exe 82 PID 4160 wrote to memory of 3896 4160 msedge.exe 82 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 2368 4160 msedge.exe 83 PID 4160 wrote to memory of 5004 4160 msedge.exe 84 PID 4160 wrote to memory of 5004 4160 msedge.exe 84 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85 PID 4160 wrote to memory of 4984 4160 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4778b6273cf5da73665ad17d8d728998_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14976711951931507518,3963476971300191880,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5fa4827eb2963b44b981e708363936662
SHA103371a918bec9718f8c75be5ee26056d1267a4c7
SHA25642487273d62e8f7f3dabc8f64b9915dce94336184e7ff0cab31c9b4aed3d0e91
SHA5123fceacf9d7f643aaf612f4efb83155a003dfd5e9ff273af547a1d27bc9d787a87248a2ffd87d82f15da9602268500e31164410e4d08a0ffaff73e8d488ead201
-
Filesize
6KB
MD56d8d8f811a18c708fe01cf3611e2d4f0
SHA19d6c174ee424024989dadf3dd12051344be48810
SHA256c132cfc1417c9d84cfe1b1e3efc93841da34068ca904155c86790455dab2a043
SHA5129bc3c6de32532401dd4aeafc21a2191799ab4483d4d7af1e7883b2bd24fb85cb82456958934318a80bc62c4c83dfa074de2ac11429f490481d77472adba8476e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD597f7e0a0152e9a5e64f6bf8e631a1f00
SHA1198c3829bab7a5471409ebeb4da2d337515dcc27
SHA25693aaf9dd3904fda0b1ec8a7dd744d5c208e190abc031a29c9bae90e74a2310aa
SHA512a2c0c700dbe7fc40d13e6a850df995593516d2c9dea1a83b7d23973481d03550e05d67e97794e83c3f336f340b449c17cfa8a3a1d50e04f832adc0578695ad29