Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
4a485261da0958f3bb0cee63be4d6261_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4a485261da0958f3bb0cee63be4d6261_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a485261da0958f3bb0cee63be4d6261_JaffaCakes118.html
-
Size
26KB
-
MD5
4a485261da0958f3bb0cee63be4d6261
-
SHA1
8e8245428f0c2761701239a0f6d2f743c5ce6711
-
SHA256
9f3fb67fe398a32879c9f668b7a2910b6d3173bd93aeef89ab0968eb80714df5
-
SHA512
e14c7d4e3bf1d41dc3dc498b04ffca5fdd72ca65cc398a15d90deec3a9fbbc3bc29255c0d44a84395613d15f69e915915f62eafcdd549685c6764a89132fa725
-
SSDEEP
384:06iu0APSGUF7xuKaCND+yACkyb4adWdZX5C3KmSRxxQDdGgdF43ALj3TpUwMIZpX:viF1IKaCF+yACohAfCYpB7w0Gt8YAzb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 1572 msedge.exe 1572 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4456 1572 msedge.exe 82 PID 1572 wrote to memory of 4456 1572 msedge.exe 82 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 4708 1572 msedge.exe 83 PID 1572 wrote to memory of 3512 1572 msedge.exe 84 PID 1572 wrote to memory of 3512 1572 msedge.exe 84 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85 PID 1572 wrote to memory of 3528 1572 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a485261da0958f3bb0cee63be4d6261_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9924846f8,0x7ff992484708,0x7ff9924847182⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,6525381361445711501,7451079544469573960,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4660 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
303B
MD5ad755d3fecdc9be9fa4c3c8bf3c90d8f
SHA188f6978d823ed85052edfb0d772c8a200714cdc0
SHA2560e16f5f742a92902c27fe2ba27cfecdf2f31756014e9b9ad93d305b153f2212e
SHA512e513a6761212d9451652acbb0da22f252ad9acc2739bd56b4ebed21b3c0c411d0d1b55a12c94c119417be42ad827aea2e97c51fe5479cc9d1b47bf9e1f993d4f
-
Filesize
6KB
MD5e960e61c3e7e3c0343e3e9d39112dbf5
SHA17b821b5d2568dae6bb514f33e6cc08eb3c30c5fe
SHA2561394886b38d6ed01d2188ae8e4767e9368276d2df5e488d9b85b197fdabb1021
SHA512dee8c0dcb3c14f2a23e5074ef679627f9c00daa69c54778b34da931095fd8722ac31d53f352a2ef9c56f43189fb1165ac79a1818d719a51547805006c8be2c99
-
Filesize
5KB
MD5daa98234a7c05a1e43252719364c7687
SHA137c2629e54f29d40a687e4d646c1944016f9cc06
SHA25679e37b82361f5b30a66cb3c2ead3e02a493a0fe12d0b4ce01cd75f5d8e3f935f
SHA512a56c52e837eb80cd2c5eabc27646056fa0ad80bebb2a0186a5bd2e605be37464f8bfe791bc6c86c9c17c702967e3e1cdfb29bb981876c47a6bd84f854ebde797
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ef7bbcda8ea1c85c0c1f6c4d8968b2f6
SHA1d1630799cec77a285fa4e8cc0392088aa2c75fee
SHA256fa94dce14835630521d5f568874bd3485fb04bc7ee88e1a76d41cf48fa2a59ce
SHA5125439450c0e29a3c5e4aee58edee909b0eaee6a6504a77b86ec5787b4f86609c05cd3afd510e0eca19737ff59fbd6a0e6b3153bb73c1f1c1ca421bb3b5db17e64