Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
497c0ab7785246f95589bc82893ad879_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
497c0ab7785246f95589bc82893ad879_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
497c0ab7785246f95589bc82893ad879_JaffaCakes118.html
-
Size
23KB
-
MD5
497c0ab7785246f95589bc82893ad879
-
SHA1
d58b74b09badaa384d769281d0c5e02b92565ddb
-
SHA256
1850a46a59655aefb8ef17413fb6f53e63680a01c863bb75fc3bb6047f188f0b
-
SHA512
73d05cf7961af93022386384031d39057cd48d9071324a4a222d62bea1c17a53aa3a03466f95a140dd6049456af9be730bea1ed7cba604431fc741bb90921f8f
-
SSDEEP
192:uWLIb5njynQjxn5Q/SnQieRNnenQOkEntmgnQTbn9nQvCnQtVwMBxqnYnQ7tnYY5:iQ/CnE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 2532 msedge.exe 2532 msedge.exe 4580 identity_helper.exe 4580 identity_helper.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1960 2532 msedge.exe 85 PID 2532 wrote to memory of 1960 2532 msedge.exe 85 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 2212 2532 msedge.exe 86 PID 2532 wrote to memory of 1612 2532 msedge.exe 87 PID 2532 wrote to memory of 1612 2532 msedge.exe 87 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88 PID 2532 wrote to memory of 4432 2532 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\497c0ab7785246f95589bc82893ad879_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa006e46f8,0x7ffa006e4708,0x7ffa006e47182⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8138361670594925827,1065038410859736559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5e1d80eb7fa618dc30a80309ee8b4b2e2
SHA1e6763f0641aedd365bcbd23eef1ab551268af23a
SHA25696461c7e7748449e9bc3f813e93fd6cadb212d73b4a55377bf5a44ba053d7d1f
SHA512c4f218a050d5a0f00d985d3fd0231c7320ff05be58645dbeecd05f0b4e2ef0fbe53711883d507e71c380e745dc192ab2c6033ad4073e0bace719e256300f0c05
-
Filesize
6KB
MD5d8982eddce665ed60e7a57b4348d04c1
SHA1ffb20928298c281d396d856abafe818043c77c45
SHA256160c0adcd1b0324f4888da982da83b444fb17aeb8905df757ff41170102d7ff0
SHA5121bb4ba5ad18657d803c0e243f32c693b02cff864c7c38320437ab76dc67a888386cd38c75ae711bdb3c4668c05150bd36d390a635cb3cb897b22edade33aad99
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dee35b675844d6a590d1880e19f082d9
SHA1285893df365e81002b3ab2004cabbe6be6b7acfb
SHA25684a7c0f592698a0261c429b9d0f2fb5210e16a6d365a4b49565d9559890b9b78
SHA512cd32d2dc76e2098b358b91dd65825eb4c9a124e0742f4deda77e769605b959b819247c12b3b8b9be06ab802873a17aec26730b7973eb0596aba174115ca2b1bf