Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
4ab09ca950e26db7d3ba86f272700496_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4ab09ca950e26db7d3ba86f272700496_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ab09ca950e26db7d3ba86f272700496_JaffaCakes118.html
-
Size
104KB
-
MD5
4ab09ca950e26db7d3ba86f272700496
-
SHA1
24c9dc14df2878bff3c7e2530f2e76f5d6a788cd
-
SHA256
cd883539f1c4ce0d2be0863702a3a1c4b47d3ad3258cb35b9e6131b4e790ef24
-
SHA512
1090ee1570d2f277123dd5b12b6e6cfad718423fa410adad8eb84c121d94da7a0734d105136f3776bd6ceedd1174359e6e0beddc0e6dd588070e2e8ca7de8d8c
-
SSDEEP
768:SCoEes1Np0gZ8rvWSRZ7cnyACpdVTkROqtrUhQ44Aguf9wxKmopXM0VoFB4Q5j+9:SCoEecSnRqJey2X19D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 1700 msedge.exe 1700 msedge.exe 3684 identity_helper.exe 3684 identity_helper.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2280 1700 msedge.exe 83 PID 1700 wrote to memory of 2280 1700 msedge.exe 83 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 4592 1700 msedge.exe 84 PID 1700 wrote to memory of 3172 1700 msedge.exe 85 PID 1700 wrote to memory of 3172 1700 msedge.exe 85 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86 PID 1700 wrote to memory of 3196 1700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ab09ca950e26db7d3ba86f272700496_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3858640024174563131,2412785103243100603,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0e731def-275c-47d5-b2af-bd7c5fb01fe4.tmp
Filesize6KB
MD524febc92dea0fc7987f4b00e5914d8cd
SHA1be653eb11ae45511381b1b230a03c19d6b4509da
SHA25687e07550a6f797a7bbb2cb8d5f5ac557a35d71d9c7617b682be23a016f040dce
SHA512bdf10b511850b334d404630d8fa914e8d56d34714df88ba157899f481820d9257184158d53177962ebb9bb329d4cff13dee1ce57960a6c04bf7b5730e0a939af
-
Filesize
304B
MD5dac5d2006417844c055045249c4e713c
SHA14f11c197d13716f9d74d8a8c0505c538f3c1611f
SHA256366b2bfe85e4b87e8bba3042e640f7947aaf099702fee2c6d663c320b5fb16b1
SHA512cbae904c62ab994a5d95c0162996b57179cb120c0de19e9325113cb245a36592c5a5f8faa5746e4a6db9e185f26d52356a35ede73987614a0ba2cd3118973c78
-
Filesize
5KB
MD5cf9897a5a563b84c8d63c5e847e3bcb3
SHA12312c8342d795411025245d8975c2850a02d683d
SHA256344e260893f15b222a6ad88d2ead5f3349b771f23aff1a083ab08f24d7b026f4
SHA5129d17574b122b8dda8ff2aacb5801b20177a013923603966e394071528c5dcef5002531c78e2ede969763db96e8e4c59862957091e35871030b159794043398ef
-
Filesize
6KB
MD5ce4b547f6021fa302e9c7a4420872416
SHA1a67ee83fa774e9b02f91cbcd6d75911bde9c73bc
SHA25642b8f6e84b51359cb66ef27288aacefca8b0f44f8ff53b4f808e2faf0d230ba9
SHA512bdbe7b8061cb89dcfc0c63f22c4aa7771b4ac265d7c01494920a362d403a292902f38390c7a6111eea311896f0ad1f5a17b2d1c6f1e25bf55a7f170bf5767ed7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD553cd820ece233b7af8581084eb1f055c
SHA1ad033d8d02fa6688e1bd601458b60b3434c3c7b4
SHA25684205a6193a051b50c1c53055d8e02d350d76e230e46762e2ced4b0ab945981b
SHA5125e81a7ba70fc3b18e8a4a805bd7cadabfbf837956689b01a0da7c7914991442a565c2243910fc6e4e7c9cda82a5a62cfdb6965a54d2766789da35cde525cedf1