Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
499647ce2bf4d342d1615a781cf146b5_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
499647ce2bf4d342d1615a781cf146b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
499647ce2bf4d342d1615a781cf146b5_JaffaCakes118.html
-
Size
247KB
-
MD5
499647ce2bf4d342d1615a781cf146b5
-
SHA1
6b209f9a4ad2b8f8d4e7980406c21ae04b058cc0
-
SHA256
363fac1a7d3a0e7721db437d5c01a117dfc1fd0c99a753006d4308b1ec777800
-
SHA512
e90b6165b0b42659f89a804fb85f9523673dbe9e76986cdaf578778f86cb0c8ab9f30906ea0f03c1212ef4587c0203817ad2bacd254d471b803e2f3122ec6da8
-
SSDEEP
1536:4WVwqhKS2MPJfA+dk1ba4CjRToNw+vNdcpP4SJqqIQzZl9GAvPJE:JIti5UDcFLqqIQnkAvPJE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1208 msedge.exe 1208 msedge.exe 4520 msedge.exe 4520 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 5076 4520 msedge.exe 83 PID 4520 wrote to memory of 5076 4520 msedge.exe 83 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1156 4520 msedge.exe 84 PID 4520 wrote to memory of 1208 4520 msedge.exe 85 PID 4520 wrote to memory of 1208 4520 msedge.exe 85 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86 PID 4520 wrote to memory of 4296 4520 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\499647ce2bf4d342d1615a781cf146b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb633a46f8,0x7ffb633a4708,0x7ffb633a47182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16904264090754194181,6778115717421759630,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD59a89ab3f39c32a33f612eb95abc308f7
SHA183db5b5b575bdb1450108875dd936200a6a7fb37
SHA256f96b7ffb832ec485e33e15c9f2172584612dc793f6a149f0901b5b0d25d3ea26
SHA51245a056fe95a90de1cf69ffc4e70f5e83d74a4db9e235e7e72e9e1dfcba46da706200adb8d4decb6f0bff6b06439cef0d45e5649824d918f5b1d3f632ed0ecbcb
-
Filesize
2KB
MD538ba51ce7aaca03d9905a89c24d524ff
SHA1e34b7210e13f712d9df997e424db7933578d9e08
SHA25630f7797317b103c1423557276670e9b8793343295368609cb3fd4299de112d27
SHA5123d571ae2d73152978cdfd6f489558362707680cb8be762fa1aaf318132933f8078bda72e44fbb5a7decf7b3e530881efed2b88289bd94d34a0bb7c632619d0c1
-
Filesize
5KB
MD5c02158a05acee21a8355e02e7a87f666
SHA1bfb938db1126cdc76c03761546055bca650edd97
SHA256dc8c4569ae311718d24af8002219d4cd131b13cd14db0551893636a8aae6e973
SHA5129f094454a3c432ba1d10ae16ea8afbdd3ab7801d9717065a89a72d5fa318e58b147f2ada453886e52da34f0ff60d72f1dbad8948977b12dc682d7bfad585d683
-
Filesize
6KB
MD54703acca484a85dfc3797e98a4adf3c2
SHA177752fcd391fee8864455ad6b257be92134430f2
SHA256ae95b07235a8c0f546715fcfab051a75ac015b2c120c6533ac9f454223200421
SHA5122683fda49440b063b7039d4444602ae372664de961ed9d1c9884d3c7c183a48423c50799ed3c425ad2af6ddd9920dd907c86ad152e040469efef6281c20d4ca9
-
Filesize
11KB
MD5182e8309923e5349fb82849c6fa848cf
SHA11e89c13d7cb3393d0a8392cbcee4a028f3131c23
SHA256ba2035911f1fedac34cd374213aacf8c95be29f69cc29484c13148dacf7a714b
SHA51295346e63a11250c8e618c848ea35a2457d57c3a627a36328e8132ad3c7d838a51116bf0867b143bd294a4e345e7772a6106de1332d36c7ace4f20469d3d198e9