Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
476511740bafc7d4d70d29b4ac79d47c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
476511740bafc7d4d70d29b4ac79d47c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
476511740bafc7d4d70d29b4ac79d47c_JaffaCakes118.html
-
Size
38KB
-
MD5
476511740bafc7d4d70d29b4ac79d47c
-
SHA1
183f454ff82067cd7569a60fdf5aa71227bdc08c
-
SHA256
49ad63a984868ee46ef9f91ea8cc78e6c822446a27b361863cbf8b253e08d2c4
-
SHA512
bbd2b8397cc0525b8c728d2c7dbd6577012de192708dc0ef818cc773d0acc39eaad7e8eba17b8631df722bd187cd0950c97268e29999386d60f75e3a4ce59903
-
SSDEEP
384:w3qfBTJOb7XSWul2f6/RBiQPFAI1bPajNdGKw34cDxSOzhivdgZyO:hfBi+WHfeRIQeqbPCqDTe8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 2340 msedge.exe 2340 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4052 2340 msedge.exe 83 PID 2340 wrote to memory of 4052 2340 msedge.exe 83 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 4264 2340 msedge.exe 84 PID 2340 wrote to memory of 5060 2340 msedge.exe 85 PID 2340 wrote to memory of 5060 2340 msedge.exe 85 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86 PID 2340 wrote to memory of 4444 2340 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\476511740bafc7d4d70d29b4ac79d47c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe8ad46f8,0x7fffe8ad4708,0x7fffe8ad47182⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11385988677608278101,3623791502218233310,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11385988677608278101,3623791502218233310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11385988677608278101,3623791502218233310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11385988677608278101,3623791502218233310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11385988677608278101,3623791502218233310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11385988677608278101,3623791502218233310,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
177B
MD55b1a7be55f8db0b19f319a2004d2fa99
SHA138c0e7eeaf6bce1907f81c8b21c6e4206ac91445
SHA256cacc6b91682b000109afaf4bffd0c5d172acb6cc637e4e6ca0e32966fe788200
SHA5127435e0152a9c4a90d0eb699256459ba15f1b8899f749ec73937a847f62bfe8ccaec08ea21badccbff4e504cb2e2b70836bc9c2d73731f3037e8f1a732d2e91a4
-
Filesize
6KB
MD591b8b752861805a717a62b5cc64514d5
SHA1d986172374a2f15b6e235163c3cff036127d8d4f
SHA25613d484246e2ebef3e2022be74db2111aade890678e536c0869dd95b2e710b912
SHA512d70db38bf127734fa8b91fb6825ef12b51753b4f0856e2f077c7243a8b7f27429fcbe0582eb0fc65f9b2f4edb81c8f9c6e60ffe0bc23eedfc3589028d25c9b8f
-
Filesize
5KB
MD5ba87b1c128c254ba39f7054481451a99
SHA1f30d4186085a72cad3e1a485deea982654099108
SHA2567bc270e4e7c0dc75c5bffa7ec8444ed0763a987fabbcbae8cec37ba819497bb2
SHA512a7307988996bfaae46306bd3c10ea81eb0c51fc5d8fae9b4b957da5f0d6fd6ba75f6bcaf0829e82687588dc5e5b8ac8f561fa9cce84604249e1f2689502cc1a0
-
Filesize
6KB
MD509aa931b68d8cbbdcbec4901de5eb91b
SHA1188a18b064f75cc7366efe3d0f8a88da2c9bf360
SHA25693bbe2e04d6f31db70b640af9345676abc589097525583de0b80b88e751685f3
SHA5121e714dabb920def0d501b04f394ecc2a4ff53f867967ddb44cf42f0d14d31d615a4466a886c5cf62cd6997b18923a89bbab778a30567b42260cceeb6238b5e54
-
Filesize
11KB
MD50435b9f00155c73c6a16b56e70fc1347
SHA14eaebcb1fe889d6e2f4f2ebe9a5261fac4827ea2
SHA25665f504a4c792e80bfcd7703e5d8752c0b0675b1e2760e1deec1426231a4a46d8
SHA512787baf702f5d4660e89c8bc7df4fd7ed970a9a68dcff53d534344c962109680ea63f47a2200b383bb03898209f97616197f9275dd5ac46e9c46d6e75b05ac17f