Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
4b2de0a97f3a2a34f04bb77e6b972fb2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4b2de0a97f3a2a34f04bb77e6b972fb2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4b2de0a97f3a2a34f04bb77e6b972fb2_JaffaCakes118.html
-
Size
33KB
-
MD5
4b2de0a97f3a2a34f04bb77e6b972fb2
-
SHA1
f9ab4a1e8330cadbd5a4387f2473e1a5a8392216
-
SHA256
6160e12dce9fc27fe97ec3219207623a00abca7b1c559709aee74cae2c26b20b
-
SHA512
579114f3958e00121c7da07a55d3fb99dcb7e3c18b201438c6180e5f78b2b52f201625d2f563c58698cb7fda30f1aafec0d8cf4f32178aa3dcb5ad8a485242e9
-
SSDEEP
768:CRe9ydLqpnt1LflX7Nlw9JFjQENILU1P2SYSJa:CZqpnPjtpENCU1E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 936 msedge.exe 936 msedge.exe 2108 msedge.exe 2108 msedge.exe 2180 identity_helper.exe 2180 identity_helper.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2576 2108 msedge.exe 83 PID 2108 wrote to memory of 2576 2108 msedge.exe 83 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 4348 2108 msedge.exe 84 PID 2108 wrote to memory of 936 2108 msedge.exe 85 PID 2108 wrote to memory of 936 2108 msedge.exe 85 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86 PID 2108 wrote to memory of 4184 2108 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4b2de0a97f3a2a34f04bb77e6b972fb2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9b46f8,0x7ff8fe9b4708,0x7ff8fe9b47182⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,8400339585988646984,8315477801893659870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD576649813656179e92fe5d11cc88fe637
SHA1fdbd0000f000ca557a952fbc7f9a9b8385d2bf8e
SHA256f0fc64413125ab197bc7be9744afdd5c7b52fc8cce2565a471f3ae9f25ff15d2
SHA51254977eba31df97b71330c717636ab7a5abe9e0174d82a0b675802389cf449a58f80ec3f86c07aa7b5d441d63e74196315e71843baf87f522cd144e057519a345
-
Filesize
6KB
MD5275e42085baedf7204937692dcd332ec
SHA1e79d0c03be3fc31c12c4f25251a9cfe6dccdb2d4
SHA256de95e93511a3770ea099faeff7c8fc3a78d1d579445c732529990eff9ae339a3
SHA5121fe34df504cd6c259fabedea85945fa8c2b9e55bf25595ae72a6ea3add77f3adf30ebda0e3304a8b66ebfec736a8d1ef6ffb9d30d3a4d8e24de3598ebc3c8d07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bbb7804c-5fbb-43a9-b780-29f67af7baf0.tmp
Filesize741B
MD534095c617721c0391f7b24ba76748cf7
SHA1e3b5a751eba82f307d607fc97eba37c5be99a5dd
SHA256898ed02f16903fb28a0bfe863110744ce199984046a151ec77c5d2bdadaf82b3
SHA5120f19f383165ff517b1b3487a11c3774c7944dffabdc5215f7a04eb5708a0b070a22a693bc8098937c0f43a078e107b4563ff83316aa12e43aa281497fa3f5fd3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55e827251297f70239696c6ded39b210b
SHA1feda3a3d4233e688db1d8796645e2559b687169f
SHA256c2e33094a81f17196577071d1242f208c9258c313bfd647f63a4282d69d9a9fd
SHA5120c42cc72837dd045d97eae1249383499af64ed5751be1c29ed444dc63b4e4c1ab6d15fbc94783977c887c2c10f3e7fe2f8211221921d489831a398b22bd77583