Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
480fceda8193ae54bed0a788438c2377_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
480fceda8193ae54bed0a788438c2377_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
480fceda8193ae54bed0a788438c2377_JaffaCakes118.html
-
Size
325KB
-
MD5
480fceda8193ae54bed0a788438c2377
-
SHA1
a4b0ceb5f17a12c39aea4b44cfc1c505cd16523a
-
SHA256
65d7d4e7764b4fccdde5d0e67eae46b3bcb4ff3fffe410fd3966e6a7eb32ec79
-
SHA512
d58d11d814879bb2d12227324880792984e181e95b2dc0e95036423b6f4a31f5a38319ca75ccc40df8c2db29c4b6a8594e89caa1a5a42a5e68071a246a7d6d7b
-
SSDEEP
6144:A4f2/58XKk8iV8qKbZL8Nck8ud2Fyk80Kk8c:i6eNME
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 2972 msedge.exe 2972 msedge.exe 2264 identity_helper.exe 2264 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1836 2972 msedge.exe 82 PID 2972 wrote to memory of 1836 2972 msedge.exe 82 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 64 2972 msedge.exe 83 PID 2972 wrote to memory of 3220 2972 msedge.exe 84 PID 2972 wrote to memory of 3220 2972 msedge.exe 84 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85 PID 2972 wrote to memory of 1528 2972 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\480fceda8193ae54bed0a788438c2377_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc074f46f8,0x7ffc074f4708,0x7ffc074f47182⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10105095249647617816,1467511231179180263,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
954B
MD57d8902525e862d45041501437c9f0d71
SHA1ecc941569fef1e43f1f30aec7bef7533c4427c23
SHA256d285aaac6d9bcb254b6eb246fe0eb772f58141442dc79ee80747203fb70eede3
SHA512e1ae1a9739a3888961fda87ebf26ea1ce27be08cb1d6d4ec7bbeb137e88d8767009b36ba4f95d1fb45bb459556da67d6964d3b04f96a8f939345eaa2720d09e7
-
Filesize
6KB
MD57af88038d9e7cd109921dfa5cbcd4e7f
SHA1b9d2f4bbef327fe70cf2a4a85bbcf54b52f1bc23
SHA25699d2340bff8ce293c016b26b70c17fd56beebcccf9c2f562a876cd0642db900a
SHA51296feb7a540b9c1786020f8d2e3617088dd5d75fd33c93acd482c8274912ea314192ca0c963b986d1f6e625641cbfdf028fbe4226e11843997cebd9fe49a88d56
-
Filesize
6KB
MD5c50e89e411ba36bee510d15de3fc2e21
SHA1e64a62ced698d5e44031098a7cec89f13278bad5
SHA256929cfa9ce850a43e8a2029760cf75a86a11a01e236cb1691e1d5ff6ae974ff04
SHA5121e3c44125cf6ba3626bbfaa4bc5c8ae3ab16d3dc86bc065ab010a70a290f638c7526a4544495d2b269921c1b7ee4d11cbeb5ffd525c1ad605734f70c1798f43d
-
Filesize
538B
MD536ec94c483163f39c5413e97c563285c
SHA18272a47425f822f5a51c52a65438d7d616493ea6
SHA2560792a03d88f44a35a37d6cb61337108e8b5acc605f5cfd77c7d9c46ec98ea8d0
SHA512af8d44602972d9ebd8b016b7d7f686f7c0b0097d32b7e9bef5b0141b186593cade9bb676e18814adb871525249dcd2bb4dcf72a9a99673cc03b36e07668c1125
-
Filesize
538B
MD56838715d06f63165cd635c4f7daa5fd9
SHA1af84db7b7b7af8d8303fadf871367d83be53bab8
SHA256c65b78fe6360a3b1f0b0b5c4148facd6b59547fdb30496e9183ee32decddc9df
SHA5122962ecea84fad5db94d479237176df3a3c94e10125996db2d95b4912158a5fd4733fb535eda633603e16223b02b5a7476e93733f0afe7fd73c9a5d25321a7cab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f0edc8774ecfa46eba2af3ed7fe64e9d
SHA1162b206f1cf049560f7c005a56a2e0466e47363e
SHA256b7ef350553fb123f8cf7aae88da826ec7028a43f92d6a4180fdd68229265acce
SHA512753ea5ef7a27ff7ce3adae7559192043d5859c6550cc427af7ec5dce3a84549682ad77ebb120f04c20b8d50c62db1a9306bfd0f956a0d16c843a7e8cb4eac883