Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
4796b9025d60c8c33b32c635ad6b3a21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4796b9025d60c8c33b32c635ad6b3a21_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4796b9025d60c8c33b32c635ad6b3a21_JaffaCakes118.html
-
Size
5KB
-
MD5
4796b9025d60c8c33b32c635ad6b3a21
-
SHA1
8dbafea2d5206c729bf4070c42a0e384bd05ee28
-
SHA256
8ff299861c6ab8629f2a9847f5601b04d55793dc700ee8f7acf180e4867fcc44
-
SHA512
f7b81c5eab385d90be5d3c1aee9e98915648cb724cf10a3e49743e535eacec424ecd1766c85ae0b7a287d2b88b06f5b3bea30a9d7948d66efc3f9331a47615bd
-
SSDEEP
96:eu3Jht0ZDIIW0/+P3vavA4vWuPbfKw3zdUfJz7:V3JhKM830fJ/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 1508 msedge.exe 1508 msedge.exe 3788 identity_helper.exe 3788 identity_helper.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3732 1508 msedge.exe 80 PID 1508 wrote to memory of 3732 1508 msedge.exe 80 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 1248 1508 msedge.exe 81 PID 1508 wrote to memory of 4004 1508 msedge.exe 82 PID 1508 wrote to memory of 4004 1508 msedge.exe 82 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83 PID 1508 wrote to memory of 3828 1508 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4796b9025d60c8c33b32c635ad6b3a21_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c0a746f8,0x7ff8c0a74708,0x7ff8c0a747182⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8150154739333869717,1783313442928463552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
188B
MD5ba8821f1365fdd27dafca80e504a2ddb
SHA1919262d3496f888377700ab97a5696756e5f2cd4
SHA2564328f635ff9aef637edc0b7fa4857b366182848a3c54b3c22f99c1d0f474cfb9
SHA5121ae2b888fa470f3a150f61ffc3e045e359c7a095732e4170a7631ea1ce774b0afc57149ca72808c53471fd2d7f780eab7bf9ff748b1a117232db54b622b6421d
-
Filesize
6KB
MD506a32564d4ec413377311dadb9b65f5e
SHA127421e2923d87b3f6b61225d78a11fe05b44e5f9
SHA256c8a8d0acb3e23c9909833f57e63455fe77022e2cad1d598aa3d95757f6606faa
SHA51207324737ce7cab95612302df9d2ca326a81520c92f0cb6141d8139ba4e39c57d49eb9f6fb9980de44d25656c01ebbd73f33ace9a5c8fabb99e1e6cd4f8ff0747
-
Filesize
6KB
MD51840bf77b8a154ef6b0eda2835541f4a
SHA110b4478e0d38ef84c42c25971286631362d07da8
SHA256d85039aca7dee2ffa182fa56234a179475d5a13de9c7e78900656fabb5199cf7
SHA512a4fda697742c45db307e6f7c215b1f470aa222964fa4dd088a2622e5ddf540555e0ca8b9dd844cbdaa167b052a88bcd17bec61d5c0981a3eb610eebe89485b34
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59def4283d02ef0e7fe6565c498eb9bda
SHA16c048018b6cb2f80341e8a44c108b0c4bc0f9910
SHA2561dabb3ce9fff513ccd9cc24a7744215d162f6afda78c26ecdb667d7a47c857ff
SHA512809a06d488c1297788e62ac5d7237e367daa5f7d5972659517fbcdf45760d1f187c814b28da11551a3af184732f1897207dcd32bcc48721d748dbe2936aaeff4