Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
4bd4a2f787faca516a277eb46ee97418_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bd4a2f787faca516a277eb46ee97418_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4bd4a2f787faca516a277eb46ee97418_JaffaCakes118.html
-
Size
58KB
-
MD5
4bd4a2f787faca516a277eb46ee97418
-
SHA1
50a48a51dc2333385857b47ca32ad0c37ca20ecb
-
SHA256
d3d8f86c31e087c059445ab12cced49e175ab5f65ff74f0f106f068c685f7bbc
-
SHA512
44b7b21992954e097a7b07c6a71147671f6c8404e71b0f1e6efe4ab2b2dc0aeb2e320b696f999e5f0f378db3d1e935d8c1a94ad1e60843953ec2bd26d50e4435
-
SSDEEP
1536:oDU0HDi7Fj0RnBzPcJ3ljIVkSir12qJ/b3N6GXUesbpEXgRRz7MAael3CdshnKhR:SHDi7mRnBzPcJ3lL/zN6qUesbp8gRRnc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 744 msedge.exe 744 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 2572 744 msedge.exe 82 PID 744 wrote to memory of 2572 744 msedge.exe 82 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 4284 744 msedge.exe 83 PID 744 wrote to memory of 2384 744 msedge.exe 84 PID 744 wrote to memory of 2384 744 msedge.exe 84 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85 PID 744 wrote to memory of 4504 744 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4bd4a2f787faca516a277eb46ee97418_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9da146f8,0x7ffb9da14708,0x7ffb9da147182⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2470620130313326009,17573976989159520724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
5KB
MD5e17e951e94b9050db4ae466654bf221a
SHA1330642da9d94894035d9441b5d4ed999db5390b0
SHA256b92700768fb33fdb561422b643d8baefdf53f2a187c759641cd325379566d3f8
SHA512f80f28694398a85a5d8b57e74a4d5be4895033992ef12b43e3c85a4aa4129dd6ae1e3b6f4319014c50e6a0ecfb2def4d02f0ceab5ad8cb7de7fa9411a6e8a0ab
-
Filesize
6KB
MD522b5cb6dc57663a25db28aa1c3b7d1a3
SHA1ea0232f5f48b35fc3d6c99d9929e650696361f6c
SHA256f698e9d3091d90d4ee89f157ddd1c912e2475d580683e84e29c9ffdd28b214cb
SHA5123d060c4ca1c0e0f5063effca4a7831e944181f08e3f67655f120848b235d89dd941ecaaa7682d8fb8b27571ab0f65dc68a9b84ceccb249d4abb5efa0df840d6a
-
Filesize
11KB
MD524b1df8f350fbf93cd1793fd0e3e1c4a
SHA147b850873dac844639ba1be131e90c5b630dec4c
SHA256946e864f12b622b9cb148386717187c7ba0c9f21bf7b172bd2ed37ae4316a9ea
SHA51203f221b75ee46ba82ef0c28f58ff8677c9a851f21d4a0df52ad81ee55c5c3152b3b547c01c88d7b2aab4ae482087ff1c9bd67b0e43f5d641f2730bfdfb3ce82c