Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
48052739c695add52e00afddd2e84840_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48052739c695add52e00afddd2e84840_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
48052739c695add52e00afddd2e84840_JaffaCakes118.html
-
Size
31KB
-
MD5
48052739c695add52e00afddd2e84840
-
SHA1
8d0f0a1e512dc1fb74d1039ed2606e697170e427
-
SHA256
168da7ae315d2b8bd4ec2ef589ad94ffc1b8f00c63bce662204366cbff505b0a
-
SHA512
95addb011f1f8c591f56672d3494b8fe3a0818d6443e9ff8678905eba47316df9c84e6ba015aba58094275fa7a5a8de79204eebfe7c655b0af8bbc11b415ca5d
-
SSDEEP
384:4V9iy2afzGsBMtJ6rJvYOxXmOspG/IJe+xw/TTeEcSO2yOTE5Slh7/3SC3o57yfc:ny26GsC+Jv+xw/feE/tE54/dQ0YJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 4832 msedge.exe 4832 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3864 4832 msedge.exe 83 PID 4832 wrote to memory of 3864 4832 msedge.exe 83 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 4880 4832 msedge.exe 84 PID 4832 wrote to memory of 3380 4832 msedge.exe 85 PID 4832 wrote to memory of 3380 4832 msedge.exe 85 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86 PID 4832 wrote to memory of 5028 4832 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48052739c695add52e00afddd2e84840_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8958546f8,0x7ff895854708,0x7ff8958547182⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3028 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3376 /prefetch:82⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5756467932307435045,12464560519413281019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
649B
MD5f4bd57617f53985fea4c027cc2c6bbe5
SHA1f9cc726bfe60dae2096601be316d68bf19121ab6
SHA256579e5a2af3b1cf77e0e532ba489926acc129a64b54f2654f6cd1ec9d6ce91e65
SHA512d49feb06ec9f9d81a3981787f6c0bfb7a209a8046646f8ca709a14d0042d595b9b4a082f4a44f9e6b131c7e89f55e0bdad77dc60d1dccad7cf03bf672ac44b5a
-
Filesize
6KB
MD541d46bf8c414b86647f155758c2edd7f
SHA1c0c8b47d108a61fc4bf006ffd8c5dc67893f77fc
SHA2563e1b5cf2f8f94848d8f5023e1481fd5b96dc5c47ac2a4717b581a92cb97d7418
SHA51255e29e606dd9b317be2d1c601e9565669a38f499bf4ebe04dc00f5e237e2d02db5507f960278aa927e2d88fe4b4f9bf559237e6ff21752a55a875e5cffee4ea0
-
Filesize
5KB
MD528a5ce7e1602327f5aa42973e1b3341c
SHA18070f486597726035b2ef55a4144b00c41f24ae4
SHA25690845f95316f455c8e81d679d9abc08c6318f0ec07a936e8f344c2c988598e6f
SHA512f470522f8616ed4bc2168094aced334744ac07c09c62cd2b36cf6d35dcd81b4fda089038a0c3a869bfd959aace6553ab98c217792fad5941f86079662930c50c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3a568721bf494b943539ebbd1f31a1b
SHA1dfbed1400be076019a0b44ad700149dac9fc2175
SHA2565587509010cab0a7720899a8891e3de7707a5847714fbdc111a1e7ec0127a394
SHA512fbd2e322adfb65407392c05a09d04a15c11d4d9078009f7db509b30643d8c79756bfb33f16ce2751c94e443d1940fe54b048c80400144d3bc21bb8b882fbdca3