Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
49234f0f374f826efb5ac3a549332599_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49234f0f374f826efb5ac3a549332599_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
49234f0f374f826efb5ac3a549332599_JaffaCakes118.html
-
Size
8KB
-
MD5
49234f0f374f826efb5ac3a549332599
-
SHA1
3aaae48bc55bb26a6e3454bceda89088f647e815
-
SHA256
539ef3470d2af066c6868b39f1c683788b8845124bbbb8f43c70822521adc5aa
-
SHA512
04d0f16dd4e057a78bf342a1e519d48021e64da4bbe75b90023c76528e5f7cd501148e637499377d023eaf1e6d13886c3361503b4e0b84d9359ff49ac4e0b5fa
-
SSDEEP
192:P1IDOYYd71IW/ZpyK5oCH3oi//IAiYpVcMOQ:tIqYmIlinIAiqcfQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 2408 msedge.exe 2408 msedge.exe 4952 identity_helper.exe 4952 identity_helper.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2004 2408 msedge.exe 84 PID 2408 wrote to memory of 2004 2408 msedge.exe 84 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 324 2408 msedge.exe 85 PID 2408 wrote to memory of 4104 2408 msedge.exe 86 PID 2408 wrote to memory of 4104 2408 msedge.exe 86 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87 PID 2408 wrote to memory of 4520 2408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\49234f0f374f826efb5ac3a549332599_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffe86fc46f8,0x7ffe86fc4708,0x7ffe86fc47182⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6133511691296566017,1331541313868130655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5dd5f2508a3c4371e56aa0146e0d76474
SHA1e50ba09120463c9a6392a982ea75d48decaa17ad
SHA256815ae4ea34ae99abd2cc3b75296fad313d3662ba1104c3952e646a9ac3e4861a
SHA5123ea6ab18362c0fa9c10581fc0ce6b4035a823abd95aa565846c10be0daa6918c4ef3d1c48bdc4b3b8b868140d214bb7e2b33b24122bbc6ea0c555c34f1636c4b
-
Filesize
5KB
MD5893e9582ecf757e8f1a869f3d430564b
SHA1a5cb62a991f87037a180277763bd33adec4f4d2c
SHA2569608f9c9a1d8c634e54b6b6ff9c47dff1b9e2530b2de96d959294a18c5b873f1
SHA5120ecf4647827d00bd932a4581ce24650beacb68e8ef8d62db1b510d560ddf5ceefc6f2d3237967df77db29938720615628e2113d6f51893efe651f99b5d8e8f09
-
Filesize
6KB
MD5ed874f347c56a240ed8f0cefcd46ddca
SHA1f672d7aadb3b49429bc6d2e92b4ef85589620e67
SHA2568a237d4e7a230b2e9154fdb13f1b72a821c28305b40fbe7d63a0e781bf32678c
SHA5126f2e2d43445c879755436abf344fcebad57da07a07a13c5c57f74e1d32505d23d1804b139a198b2dde9fba67b723654749667e613e7a970f0a724f8a830bfee2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552880b14b6376b9191e0524d9ad5d4b1
SHA19d34e31a18362c3a24c43844da17aeffe62ad7e6
SHA25686c7795a2d5bbe5ec5cc44a57d1a33e688bcd627cefa1dbe7dc5d23e3ccf08d6
SHA512d43ec25438b19ac358c6c725660a9c7f81fb62add141dd7d6dbc06fd2f1acaec3cefd0fcc1b5bf8e19b42c4cf8f713023636c319ecabad497b451fbffc120a06