Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
4a2bb7bdba8c31c64ed43369710ed91f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a2bb7bdba8c31c64ed43369710ed91f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a2bb7bdba8c31c64ed43369710ed91f_JaffaCakes118.html
-
Size
201KB
-
MD5
4a2bb7bdba8c31c64ed43369710ed91f
-
SHA1
e66dcfe8375ed5aa0e32f07a1fdd1056e520303b
-
SHA256
47fcb51ab0a2ff54cd03930a7492f655dd1a8aaf442c4010138c1678b2935ea2
-
SHA512
ddd023e472e47f124225511c711780215a4e55067b472d1cd83066072353e9a45978a5176fbd445b46397cad2679522c72d9f500b16798d0cc6be968cd9d8dca
-
SSDEEP
1536:kayveEWwkywpoq8Bh9kRHVmOn/wTA27l76Yp/hwkGvM:dypnL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 2948 msedge.exe 2948 msedge.exe 1384 identity_helper.exe 1384 identity_helper.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 228 2948 msedge.exe 83 PID 2948 wrote to memory of 228 2948 msedge.exe 83 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 2772 2948 msedge.exe 84 PID 2948 wrote to memory of 1648 2948 msedge.exe 85 PID 2948 wrote to memory of 1648 2948 msedge.exe 85 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86 PID 2948 wrote to memory of 740 2948 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a2bb7bdba8c31c64ed43369710ed91f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba57446f8,0x7ffba5744708,0x7ffba57447182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15399642499254080033,5521405586463271364,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
255B
MD56216a07695629959bd035d0fbbce1706
SHA11b4849422fd2d05b90c95b79af525ff7bdff2f9b
SHA256d5f4ff7858e246040cb1f2e5b11eb2310a483a398a7e361936b02457a00b0702
SHA5120e46fc6091473e812a6b084ae2960e5721a69c6a7fbb32807ea4db735292b0de4cfb0c047593874fd0f07b56b89efa288596747d9978e3f625bcd39297e0b41b
-
Filesize
5KB
MD523dbaefdd3da2e259434cdb652efd013
SHA14a7feb2bcb3cc262fb789e7d9afdaf1320ea245d
SHA256f443331c591b47721e9f7f092f63f7a5294b7f3c1d678b8fff81822ff28520f8
SHA512db1824c0a9ccce07c0f787f2c9a31d9bc451778cc39bef02f3bd18b49d410980eae0d0e7244f0f0f621b7e035c767b72b248311819fadd915fd07692e5e81966
-
Filesize
6KB
MD52029692bd5df1fa9f1703be06b122ad8
SHA15091fba7b842d78cd5d50874a2acfc8a9e811bc8
SHA2566ae19b9290da63195e9dd2d0756eadf5924b686c2e2f418c59cf7864c53d6271
SHA5121cd638ffab349d6aacc03a3cc2a9e4e0a7c493dcc7e4129f2318bd91c39c36387fb4a2e0873cab4c70773eba10987918da7f5b1e6a117453ad5a3d7f2763d3c1
-
Filesize
6KB
MD55191014ae482686c958523269c757bf5
SHA172707748927a91ff2c027f616da1f1857c424e6c
SHA25689a62b29c641cbcf508e795e88835addd718da1bfaf0c3a28e4491ca758ac3d8
SHA51215d8b126e4a4965a6da9cadb566df807677d4531163be2128f80a7d5ffd64c614f0f2d46e5dff4c6151e6fd9f8122614ec9edb096c1433bac42bcab18246b93b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD551c6ec648cf3f37fe278c1c19b430482
SHA14c562fa88fa6dc7021d5d5972f88bc3a5923be43
SHA25672de121327266b2091f095c6cb1c3efe9f7dfe72c64f09c5edd9e2d687b3184a
SHA5122b9e877c5b5482433eb5c9971ff7e97e0de2450376d299837347a553d7c4d2eff2b2749bd2db3fdb6ee87be5817485a3b7257349ff0fadd448045d0f34cda96b