Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
4bcf7d41b5456cd641b190fa24665d57_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4bcf7d41b5456cd641b190fa24665d57_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4bcf7d41b5456cd641b190fa24665d57_JaffaCakes118.html
-
Size
213KB
-
MD5
4bcf7d41b5456cd641b190fa24665d57
-
SHA1
3178735ffd52c2c4528e87e07e2672d814e34717
-
SHA256
bac35473daa25036f10c20b09d16c1bbef59e722ebc39d404f9fe4f8a6cce30b
-
SHA512
d05e31feab8773580e2a01e7866b23fe916657f440d1fc84b7e4692d1dc205e6c0d4182201bb48c0e72931054f3fe6c894ea2bdb4934c91e357dc80c63cf1e02
-
SSDEEP
3072:Seei8cu2GVEwvyfkMY+BES09JXAnyrZalI+YQ:Se46w6sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 1752 msedge.exe 1752 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1752 msedge.exe 1752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe 1752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 5060 1752 msedge.exe 84 PID 1752 wrote to memory of 5060 1752 msedge.exe 84 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 4440 1752 msedge.exe 85 PID 1752 wrote to memory of 3112 1752 msedge.exe 86 PID 1752 wrote to memory of 3112 1752 msedge.exe 86 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87 PID 1752 wrote to memory of 540 1752 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4bcf7d41b5456cd641b190fa24665d57_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,4132164107729650938,4268964428602499120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,4132164107729650938,4268964428602499120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,4132164107729650938,4268964428602499120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4132164107729650938,4268964428602499120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4132164107729650938,4268964428602499120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,4132164107729650938,4268964428602499120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5ba54d37caed98ab2da90ecc5c723c4ee
SHA1694ae62579f4f37560094c34bea68b16187fbd74
SHA25604ee56a8b68c42cf7ba2ac306589b39641fc9ee4dd2eabf773e31235958feabe
SHA512b4f1f68ce8150cc06013ba1b04553a0e6ab73e66fb2bb9ba574f303468ad90ffe9f9cf97be562ae2cb2066812f66225b227aefdb0e24ec8c48096080820eed9d
-
Filesize
5KB
MD5aca7ad7d957fc281d3ad662ee387c42f
SHA1d192f35d728079e98e67891e553b735034433146
SHA25612ca76888468800c9d53beb838a734da1b0d6e7700d3156052c9183224917263
SHA5123e71aff0b7bf9c4690981a96840857b14c24833362bbf44997092579622f7768b75b58e8aef9fe363490288334da2644ee224247afff128656a34c96628015ea
-
Filesize
11KB
MD5d7fe6b193bfe4bc56ae1a676a842b5fe
SHA1e7891fd7742fd81adfd96172968b544a82122873
SHA256ab3eb33e19a5365653ae12e51fe51693c33dfa4f6bd7185418786cc56be330bb
SHA51291f558b05e784bf8569473fe5c9d670c013e077110cbd8a9342d22b05348dd4e9c508f8e344094199c5b3e4f0a28f0bcb09c0888c66c26882d1101fc4c3c1fe8