Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
4bb248e53ef0c6cdb03e21fa21e86481_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4bb248e53ef0c6cdb03e21fa21e86481_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4bb248e53ef0c6cdb03e21fa21e86481_JaffaCakes118.html
-
Size
36KB
-
MD5
4bb248e53ef0c6cdb03e21fa21e86481
-
SHA1
5b85ce46b4c6ce2233bc1c27a6858cde97ccc664
-
SHA256
9e0f9f8e763bc737eab85da8b3fd9bce4a8e40550cfeabe4f5b6c938ccbcecf8
-
SHA512
8df7d5510fa593811fafb568113ca6ddefe524f93245743b1801452128945b4c80976bdfc146310fd3fbaffc1e5908866a09f0e5f78cea4cf8a439527ccd2f7d
-
SSDEEP
768:zwx/MDTH4i88hARHZPXaE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TJZOg6DJtxo6qL8:Q/PbJxNViuCS+/E8JK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 3520 msedge.exe 3520 msedge.exe 3728 identity_helper.exe 3728 identity_helper.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2964 3520 msedge.exe 85 PID 3520 wrote to memory of 2964 3520 msedge.exe 85 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1704 3520 msedge.exe 86 PID 3520 wrote to memory of 1972 3520 msedge.exe 87 PID 3520 wrote to memory of 1972 3520 msedge.exe 87 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88 PID 3520 wrote to memory of 4788 3520 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4bb248e53ef0c6cdb03e21fa21e86481_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,14837675817543726234,3531522850599703058,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
612B
MD5943f6ee8b4417a4fc5e7c69c66e5557b
SHA1b893f2f5edff85f50f636c42b3e5e93721ec972a
SHA256d4937f67319e1769594bc4dc60c56282c7a0914be00207517ca954b88574689e
SHA5126b361cab1ed3e3b66cbbde33d1c71c11445923ea6ae73985ff711ce64b75b7185c0baa11c1a03204be81c3a0a24877519420b36acaed92c6227a2a2fe722e7ea
-
Filesize
6KB
MD53583b814854e725c6fb2bdec3670b282
SHA197d4119ec49902a998cc0c9cd5bdbe645ce6402e
SHA2561d8e9ca9d1d8863f1f899eb72aaeaf3fe191c24950b0a290cddc5046f9301d90
SHA51238351bc0f58aa025c1c03a32ec47f2e33ffa6509c1139858b5969c182b977156d13f5ba309deb438cfc7d13251a9fadc37da572a6195673136f0db066e1322f6
-
Filesize
6KB
MD5d7ccb7955ffc885827d4bf84ba92a632
SHA16bac1416561f2ddd2c440d7d6f14404fb2473aa0
SHA256d3e1bfbdc393044872c4f47fe919814d8102ed448fa077c2b390b145f4c9c96c
SHA512119e1ba390a44e6a8466ef918d6a5d573f9ce93574270a50dbf914c46cb1324d44353afb544ad1940161b87aa4c3ef6f62b78a64f6b5a15d6ace78970039b6fa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD528da9f0321d03871ec6eee91f77acb98
SHA1bb099131f94045e9a21cea6bb55bacf1c0348cb5
SHA25636d017bdab5bfb249d4c31914aa0ca25314ab59fa539d4aa3e3143bc32c78322
SHA51207be78605b8e5b226cc33e921c0accc5c186b385eaa35e3f08031b93e308aaa12b8ae6f62d30551bd93dbcdd30909984ed2fa3691abe4aac872f4c5e36c01653