Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
47887cf5a466803a9f7815137ff9826d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
47887cf5a466803a9f7815137ff9826d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47887cf5a466803a9f7815137ff9826d_JaffaCakes118.html
-
Size
129KB
-
MD5
47887cf5a466803a9f7815137ff9826d
-
SHA1
3137f21f9cf8ceb0ff9b853491f6b872638ef509
-
SHA256
60077b18b5a8c167c6eb1451979a81c7162b545930d97e3ba45c38ab4ad6b463
-
SHA512
7c92d0f2b50c973a3126993e3b4b700f60ec2dffed7581191e944883493b16ae0b8e31cd60a966ac89e3b691e0acf94506e7a99d5c1bed9707371ad942d68a27
-
SSDEEP
1536:ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:ByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 3756 msedge.exe 3756 msedge.exe 2856 identity_helper.exe 2856 identity_helper.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 4260 3756 msedge.exe 82 PID 3756 wrote to memory of 4260 3756 msedge.exe 82 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 2892 3756 msedge.exe 83 PID 3756 wrote to memory of 4368 3756 msedge.exe 84 PID 3756 wrote to memory of 4368 3756 msedge.exe 84 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85 PID 3756 wrote to memory of 4992 3756 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47887cf5a466803a9f7815137ff9826d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8a48546f8,0x7ff8a4854708,0x7ff8a48547182⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,183744485744073521,14546796963078498602,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD581b4c29c8300aa7ac1309f452c599da1
SHA1923b5bc8fdbeef44ecd56a66ce6af0acb850d74d
SHA25676f067acf0965a5c914d52a288c92c1300752487c68a1c60e9ed465c01495f5c
SHA512f05a22166ef59703a9899e094b58ad378d19daef0eb7511e9e28689b59029f424aa8af4ffef8584e7e4c0a7229c7bc125917bcf29c8ee6c6164cca1f76a56749
-
Filesize
6KB
MD5b46060d2e73975003505128041bc3004
SHA165f30cfe640d677e760c4cfd47b23c86e9b802db
SHA25642621824f1c07a352896b41bba0ce252cd91faf037480205009702621d220bea
SHA512e1d29dba4cedff4ce4fae6e00ebca462827c9a3b7805ae056f0b142780b438f8aa8ee551e61a145061c5512aed59a646f47363729c6074cdce83bdad8cfd3eb5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59d3d45388900046db5b1504397f1892c
SHA1a27b3eb333346a953a71fd17aec4e708499afdc7
SHA2565cfb2218d86eb0e1672550f0a395aef8c901fcdacc337c1845637a50af605e2c
SHA512592424bbcd77c53acb97f4f94fc810ee05314632d11d2514ee1f5619d8653d15270ff01d48cdcd1795ef49b8c523bdc9d42cc93af54309a8637d25eb2c9e5603