Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
4a15e8fd5801c8e18d3fa27aafc0063a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a15e8fd5801c8e18d3fa27aafc0063a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a15e8fd5801c8e18d3fa27aafc0063a_JaffaCakes118.html
-
Size
35KB
-
MD5
4a15e8fd5801c8e18d3fa27aafc0063a
-
SHA1
9b827a6ceb47f35b346078990d82f25f598e7f77
-
SHA256
e0812d8126518a7ccb8465d42da28e62ad38b95f6509a3a327bb6bfb05a660e8
-
SHA512
2f56e2a1e6534b158fc33022c14b9ba2552f7fdf22276376525e325dfbcb26ee9084e99009fcdc468e99860d5ec59c4ce4d8e4341c695c22aa10693408326503
-
SSDEEP
768:zwx/MDTHXv88hAR3ZPX2E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TOZOF6DJtxo6lLI:Q//bJxNV/uuSe/28bK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 2456 msedge.exe 2456 msedge.exe 524 identity_helper.exe 524 identity_helper.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 4284 2456 msedge.exe 82 PID 2456 wrote to memory of 4284 2456 msedge.exe 82 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 760 2456 msedge.exe 83 PID 2456 wrote to memory of 3832 2456 msedge.exe 84 PID 2456 wrote to memory of 3832 2456 msedge.exe 84 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85 PID 2456 wrote to memory of 4384 2456 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a15e8fd5801c8e18d3fa27aafc0063a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb923946f8,0x7ffb92394708,0x7ffb923947182⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4436 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10588609630315640174,4747359394354852646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
614B
MD5d6af2a9ce66509dadf51b16c60bc1895
SHA16ca2e67b949638ea824de3758db0862cab4288c5
SHA2566f9b42bd4b07f9b9c840b112476ea9750b1de0474a02492de6cae02c5561bceb
SHA512d4bf072606b1eb4e7adee1c092d8fd7c2cc9282685d0f7c9888e617d94ea38aa859f12617720dd81025df3e9eba62fa9a36cb043bd6c4743b302dc3f39da64a6
-
Filesize
5KB
MD5ad3c1eaa98f6e2425f80cba434642286
SHA18fd453bb5b3f1dabf21c73aabceff6edbcf9f625
SHA256407167d52e7a45fab78d9bc385caf95dc473dfdccbb60e1c40f1657c25a32ff3
SHA512b14f94cdb5e124b885b24a1bfb6dba241c6b49512d268330e8e4ef7fdbc08a44e8d3f446d465dd187cf9bf28619d859a3de933c48fe54376b52ea68de1468161
-
Filesize
6KB
MD52f1421c529903b2c135918bffe58cd9a
SHA119afaa12def55ad47ee691d1ab590e717aa81975
SHA256d34ad15f1e3ef1fe56b080206b4882ca7b1d04f8078e45d036add9df528bff08
SHA5120f7a647907307f8a70f0a3318d927f803f8a33e0a3e292bcdca335686319e894cd048344336a919eb4d8f3987ba9c0f6a35126da64eaf768795e542680736fe0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58f5427c9af78e7a2ef0dbd89c07eb1be
SHA12f31f932b28f73229f37cc4d57a5f37f515321d4
SHA2560a29ac189df40063736e5cb43d3ae2dd4f6a948554823e5c8ccdbe76d7380f0f
SHA51235fba6774dd5d0e288bf3497b688504fc43587a59c369e901ff6f29ebcfddc9423e42f39d2e7f693b9ad76d3de46a6906782f0463753127c3141993246b65c0c