Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
4ba5b58ee35f4bd85ffe94a0198b56db_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ba5b58ee35f4bd85ffe94a0198b56db_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4ba5b58ee35f4bd85ffe94a0198b56db_JaffaCakes118.html
-
Size
30KB
-
MD5
4ba5b58ee35f4bd85ffe94a0198b56db
-
SHA1
0f35290805cc3d6dfea3cddee34e1c5634b99594
-
SHA256
e76a818dbd4eeca1a319fe1e212e5e9ea5122b506dda7f850a404d9cd1258b2b
-
SHA512
0dac08963358faadbc60e25f296934c2250037fb2a61243d801d471e168c9604e595b550e6a0cf8ab9abebc82225108ec75c1bfbf4aef1eba259e371468cbd0f
-
SSDEEP
384:SbHAoGzygTeyUtTmF3i2hV+5c9vGUvMt/FHnS6xKZyRtcfx3yn:SbizyIeyUUO5QDp6x4yn
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 sites.google.com 13 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 2824 msedge.exe 2824 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 920 2824 msedge.exe 84 PID 2824 wrote to memory of 920 2824 msedge.exe 84 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1240 2824 msedge.exe 85 PID 2824 wrote to memory of 1020 2824 msedge.exe 86 PID 2824 wrote to memory of 1020 2824 msedge.exe 86 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87 PID 2824 wrote to memory of 1500 2824 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ba5b58ee35f4bd85ffe94a0198b56db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e7f46f8,0x7ffa1e7f4708,0x7ffa1e7f47182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,14022993697905896410,11082908449245147799,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
700B
MD579aa3843ca0cc06d3543b0400ef043d6
SHA1865e2d651d92033ac1bf7e82d3b46cd91a26e271
SHA25636fb32dcc2291a09b6d74234a3f149d7893e9a560489fda54b40f37f02ae28d7
SHA512023ffed319cc03fa40aa61af5cc61ff53e35747ce882295e209d454bdc5870363562b48807ad3a040411fce7d80bce172da08c18cdbdc7458d7da249c6a273e5
-
Filesize
5KB
MD57dc03da363768643350a0e265aa05d3d
SHA1d6e00c966e4a113b260b452afcbc6efcf84e081d
SHA256d11deb4927dda35878704ccfa06dcd82b292bd58f2e8ec98e3b9cbc9ab93e037
SHA512aa4d2e365e41727d2a85a711101c5af9a66a1e81c2bde44351013c5db8ae0a0636985c416b30d15dde537a810e58a932daf74be4ecf404ddd2c21dfcb32666b8
-
Filesize
6KB
MD569c426da3a5eca5bf6d59ad3cde090f4
SHA19b037d48da5e23a3190610f669460e08bfa4485a
SHA256e16b258eb98250bc496fa7e9f982db3415702ffdb6803525151fbb8ba442fefa
SHA51238ce0e0720257a1d509ed0d16b30b9c0050529403f4d291e9f99ca84c8575fe80cf5e4257c018bd1590e44e55922d6e8cc285e949be587c82056638883fa35dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5391c26cee26a15a7d47362630daa5d51
SHA136cdccbf7751c144cb94b9058d8ccedb5165b3d5
SHA2567d2f9d2eb98535c85a14374cefe9a38c991e327171f3374fc6a7d1c8bfd32531
SHA5127839c86a2e600f8f273504761fd80261a048f8855ede46252bb656c296b1d6af05841022df28c5b50b29eea4bbf10f8656647d8132c536ba3eedbc1884976b20