Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
47c43619040172afbf4e2968dc60518f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47c43619040172afbf4e2968dc60518f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47c43619040172afbf4e2968dc60518f_JaffaCakes118.html
-
Size
36KB
-
MD5
47c43619040172afbf4e2968dc60518f
-
SHA1
873a5d91edec9e5645d192cc0ad5c898f2ccb0d4
-
SHA256
3631e2808fd948c328a5b9b6ab966fd3b5a60b5f495088f4f5f307ae4339ddae
-
SHA512
9d5f4659726cce95cde5c37b189e82ce547d976349e1d9be309f0c04870b02b8c91be1f7239003d189cf0a3e61096bd17cdcf5e629d0d245147280a6f4e3064d
-
SSDEEP
768:zwx/MDTHZB88hAR6ZPXdE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TrZOA6DJtxo6qLN:Q/vbJxNVgu2Ss/sK87K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 2792 msedge.exe 2792 msedge.exe 1704 identity_helper.exe 1704 identity_helper.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 4012 2792 msedge.exe 82 PID 2792 wrote to memory of 4012 2792 msedge.exe 82 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4620 2792 msedge.exe 83 PID 2792 wrote to memory of 4320 2792 msedge.exe 84 PID 2792 wrote to memory of 4320 2792 msedge.exe 84 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85 PID 2792 wrote to memory of 64 2792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47c43619040172afbf4e2968dc60518f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe86fc46f8,0x7ffe86fc4708,0x7ffe86fc47182⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6297971515689604995,15450021055258444059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
614B
MD59c5bcbe3ad1c0e22ba37b9e47b445ebe
SHA1f2ddd82302e4dacb1548783f33c6b99c5b7e8471
SHA256206d939682b566b5461b350cb37918c1d07e4faf40b90e63124da761f7eed80a
SHA5129702a4fc505675503a838cc58c22c3cf49d11f1b44945db94e3d354138605bedb9d7cc2f9e1390b2f3a86d54b794e25de34b50fad3b7c102a82fbfab5b009054
-
Filesize
6KB
MD5e49e043e75d8518717607ccbdc9c7847
SHA14e568854953047aa6c5e31357485568a4f510dc8
SHA256b1d05c32619c80aca49a9ba3ea0f82adedc9ed51e3c04f28b9de32cc51d95e09
SHA512a46318e55d1d659e1db82aeb6ebd744874500caf4d2b223a7072cf3d358adc5ff001b979fca6a976b70a1598409465eb6ec3c4dd2e9842be6f316b8def07b4ce
-
Filesize
6KB
MD581f83fd748c751c4dc3882da05b1742f
SHA108d59b2de12b200485de23ad51ed9cd770e22c1b
SHA256b7434085d75fb4b77a25c7c2997465c95c8584cfe2b06d8e2cfb357b1432a9f5
SHA512a16955dad61a36900de9263c9900c6f3f3fd67476f567b8679915d59ae315ef1e51b50720a4640a57096cdebb6090a9fff012843f615fee2805add3012768a44
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57141cc174897d6fb67ba0cb67111762d
SHA1e9f0090bc0f22b64d5f3b52b9f89f82b6cd825cc
SHA2560cfe96bcc8e969bff8998d2d42ca1c250f4b6db922d775a519542d05fa89c288
SHA51249e567ebbefdf146564ecd425fce644fc52b1b2f71c69e24547bb6f283d06fa5f826d757e0ea53e6cfb85be895ba1a499a5d7afa8378e94a17c02e5604e27514