Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
47fd53771746f167a9732420af7a45a8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
47fd53771746f167a9732420af7a45a8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
47fd53771746f167a9732420af7a45a8_JaffaCakes118.html
-
Size
461KB
-
MD5
47fd53771746f167a9732420af7a45a8
-
SHA1
22683480cb7280f9f362095c482ac4df0f3e93bf
-
SHA256
eee7d02b2e2536ca8d3193f5b9d0ce4b24e34ddd3e3ffe3a20fb5766f8432fb9
-
SHA512
4693cb10d94e0fd040fce74ce322eb288b7e34b19f1670ca0bc3482666c2887c737a07dedf46ef8d72cf15256714db7d4db0143983de33760220157634787114
-
SSDEEP
6144:SusMYod+X3oI+YWsMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3e5d+X3l5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 4392 msedge.exe 4392 msedge.exe 4688 identity_helper.exe 4688 identity_helper.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 376 4392 msedge.exe 82 PID 4392 wrote to memory of 376 4392 msedge.exe 82 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 840 4392 msedge.exe 84 PID 4392 wrote to memory of 3216 4392 msedge.exe 85 PID 4392 wrote to memory of 3216 4392 msedge.exe 85 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86 PID 4392 wrote to memory of 4432 4392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47fd53771746f167a9732420af7a45a8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea93746f8,0x7ffea9374708,0x7ffea93747182⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,2741269159312093683,17319800565394049368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD547b48ea57882472310e7a75164c90b04
SHA1d007c2995130dbd7896b24dc284c58501c61133e
SHA256dc528b3addc439f4e262b12e6b178b45a9c50559e7dc5cc77eb8a2f6ed458881
SHA512784f76bad9aaeeadea23f177156824b214689c53dcca3365dfba92ab402e46575dc9152899ebfb176d26abd9040da51762ced657d3882a5d4d3d49059443e30f
-
Filesize
6KB
MD5cdfec58747de54d79f060dc6b2a999ad
SHA1ced35c7f2ddb922668c8690ef0919609800722a6
SHA256dca4817a6c10c54c301b965a96a39c48f6c416cfaf18bbbf52c5c7ad97949579
SHA5128d83a64f2a1a385de7fee5ea9f4ff84c1efe2255c97727de13f2b77eb615a82745d81bce2ba4bbef75fd5a99518d7d4b73d94be685c7fbd66f19c1555ae74822
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5665d2fbb4935d2a7b41c2c4228e50634
SHA19f7ae621faa1812f8c58e26779f235057175c8a3
SHA256dc99e302475c3d1b266f7303a3d1b61f0145bde722a2f5e7bf4394f5a0a7919e
SHA5128b06cb77d32c6c04e101b3abf5c6bdc6803a303537c6a34a778763d178d8f08b5ecdc7b8b857413b066693efa9bf94ac200f4852418d34bdac15983eb8b5d870