Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
4a32e23a39a7e7a47c4da722246e9c1f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a32e23a39a7e7a47c4da722246e9c1f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4a32e23a39a7e7a47c4da722246e9c1f_JaffaCakes118.html
-
Size
4KB
-
MD5
4a32e23a39a7e7a47c4da722246e9c1f
-
SHA1
e338b6636407403797389f3bb2d47d44279771f6
-
SHA256
4f93668c45e466928f7405ec382c0a6f34c4914a18aa69a733dad9fa6ee529c9
-
SHA512
86786c98e13f6c460844a8069888f147c88ef2d8a8381250bab7222687eb537f29e2519aad1a1be429501d49a53cb5a2c33d721676d8880ccd8de70a221270b4
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oCQNtfwq:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4496 msedge.exe 4496 msedge.exe 1836 identity_helper.exe 1836 identity_helper.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3032 4496 msedge.exe 82 PID 4496 wrote to memory of 3032 4496 msedge.exe 82 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 1304 4496 msedge.exe 83 PID 4496 wrote to memory of 4084 4496 msedge.exe 84 PID 4496 wrote to memory of 4084 4496 msedge.exe 84 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85 PID 4496 wrote to memory of 1876 4496 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a32e23a39a7e7a47c4da722246e9c1f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84b6d46f8,0x7ff84b6d4708,0x7ff84b6d47182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2925929004125885725,7971137287174165369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3d5e96fb-437d-4d3c-8f8c-5a382da024b8.tmp
Filesize6KB
MD59ebeaa920341d07892d9200a99a6800c
SHA16cb0b55cf5013a8b8ce52ce1466b440ea093be47
SHA256488edae6d084dadf041531953971daf841a216ff30e3ce1aea3fccc850e6e97b
SHA51294b904f2b2f162536e3e01533a51fb8cba2b8701e02d071ebdd895b3e484a9bc2e824550139b382fdf8b7e30e32cc2048759dc9137e3f5bcfdd9c0ffe032603f
-
Filesize
292B
MD50fa89f3c2fc6be3df828482f22975556
SHA13ece78fc257fa35e451d5a604970635a79536325
SHA256661b6cc71979c620460582323613f80edf7ad5f1eb258e9933cd39b8edbb6a34
SHA512b1efe516773d04644b4401276d9cef3b13d8253fcef41425d2be765c57462a79da159e7ee7a77573337b0a51afb663482ff213e254709403a6ff9cd0183a5372
-
Filesize
5KB
MD5ec5e0ce5735ec0216b0ccfa0374cbc69
SHA1bb49cc7a2a4da6fa84667fe424ca6259b15385a0
SHA256737b180b36d5092fd56a99f374c71bde7b432f4c4fd89d8dc6f3c9d5bde2173a
SHA5122b3278e0ec97c568f3834f536a47814ebd7fbdf8021e115052fca677ae242e3f9e97bd73f130b42cb46bc4fbd4b653f246de700824e771cd6afb4a6aab11fc1c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c34da5c390f364d2c99fd3c50ba2d461
SHA19f96f926f1a5e59599ca495c1a9d9faf701365d3
SHA256f6b7207e65755782006c7ad11f5d3a469b52bac31372d72a2aca3052315b9c36
SHA51282059a38128adefe4ffecad474bbc41e4ba555a43072a4d97e6c92ed0faa36fc336df03d51ce18cacddb33777c2709b2bb81fcf9ed35ab14b140a81fc76205e4