Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 09:47
Static task
static1
Behavioral task
behavioral1
Sample
4a7a17be7825dfed42bbdc66c041374d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4a7a17be7825dfed42bbdc66c041374d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4a7a17be7825dfed42bbdc66c041374d_JaffaCakes118.html
-
Size
96KB
-
MD5
4a7a17be7825dfed42bbdc66c041374d
-
SHA1
fc5ee0b0dd3f5b6f391c29bca6894a5528736169
-
SHA256
4c09d97ead941cb46ece9819d9056f55baef85966ce7a74ee9533b3f9ac2a6ce
-
SHA512
a515fc501f80ec931d6f87e6fea358257c2efaa7658755cdcd49b8ddcc17f96dd1a4658f215f762ee386d13b3c0d97763cb53b6ea86c8587ec4286f9f91f9ad2
-
SSDEEP
768:3702M6oLl/NulCNihiIwtfF62L4ayyWXUkIru+UFnwJWBX4ISp/Qe+vk:3708oLl/NV4ayyWXU8nwJWBJSj+vk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5316 msedge.exe 5316 msedge.exe 2552 msedge.exe 2552 msedge.exe 1296 identity_helper.exe 1296 identity_helper.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3728 2552 msedge.exe 83 PID 2552 wrote to memory of 3728 2552 msedge.exe 83 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5024 2552 msedge.exe 84 PID 2552 wrote to memory of 5316 2552 msedge.exe 85 PID 2552 wrote to memory of 5316 2552 msedge.exe 85 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86 PID 2552 wrote to memory of 6120 2552 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a7a17be7825dfed42bbdc66c041374d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a54046f8,0x7ff9a5404708,0x7ff9a54047182⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14043152530766515902,6359880233322708009,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD56f87dc36b0fc9f89af184fce6585460d
SHA16ecbeae91affb5c828499bb361c91ab7584495ce
SHA2562eae5d877d1b74f18889cc813a8c3477c29fce47c4e2390ae1aa4bc3f381b451
SHA512b56511ce024cb0e7fc2d4f2f4ad0448cc4bf929e30b3a10e48a8a056052351a64043be4b3b7d5579ed95db5f9ff6264c569754f80cb319f4ae8dd5f87de23021
-
Filesize
6KB
MD5287f3b179d35218bccaabff788809272
SHA1073d790c6549291bf5d570488805efe6d7e800dc
SHA256b697f7f00df240b2bc97a506a61d07dd206e41ba4f371f70adde73015b68e9d9
SHA512b1342b3fb27424b5ec64fb7da302ef318dbfc5c101890cc890c68286b8e3ce44d2c180612ca0aae41a4aa99f5b6ecea27c779b1e100f5d112626240aab55e61c
-
Filesize
6KB
MD5065dae1d8bcf2b36dd6fffd65000071b
SHA1758a8831dcb77a4c0b0f7c4b1d8b909c1c8ae654
SHA256582afa530a952471b7581c279cc0137832ae697c880ca808504d00aaa89844b1
SHA512f060322c9d2a84a20a1b0d5177316db60c49c2e2e3bc91457a30efa935800a062bb2e42609c16e2e800158f1baa5d3e856e5eab5e092981a179a224c60a5ba11
-
Filesize
372B
MD5041de3d5e8cd189170f2a56e67bfc4e5
SHA14e153f6fe271708a80a5d5ea21074650136fc1e7
SHA2568c5209eb01038bcad3ab58dd7a540007f388803495a43b84dc732f80f7d497ca
SHA51229840f1a2dbfe91e37822f426ad596ba5fd799bccd0b1238e582fc6db6a167eb6a4d5fffbf4f6f10a400f48af234db54a95169e41e7e2cf0f91d929bcb6df1f8
-
Filesize
372B
MD53507adf80685a97ecf46aef2d10c6ea7
SHA150dd9585467cc728a21baa9be4d762055a1425e1
SHA256b32fb3beddb1573e5b539a10cbc20b92536a678c21e0947598af3d9fdea85b0b
SHA512b544c92a5a064a270dc1b968df26cad5a2255a45bbca57dcb2a3897385c89364a9a5c9d51c0f43d28e909caab41a6bbb809230e9dfe269a00d06b42ea70e6d50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c1c0877dcffa46e9d6100035767693d8
SHA19bdf03cf7a072379ecb36f5ac44a1af9c174a21b
SHA256ec984dca184bae6d36b1198e86caf1b3885dabca6fbb719d10f3e7ec14bd2c24
SHA51247b8106dff8e527c2f41e87bb4b7ad1eaeabb416633315373dfc7df5688dabe650ad6a0b1d5bc4d798f007b50a7244701c5c40bec97f97c3731e70530e82d0b2