Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
4c091dfe9024f5c8f72dfe913248ea99_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c091dfe9024f5c8f72dfe913248ea99_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c091dfe9024f5c8f72dfe913248ea99_JaffaCakes118.html
-
Size
368KB
-
MD5
4c091dfe9024f5c8f72dfe913248ea99
-
SHA1
7a8915b81462af4423e3da5d312130a29419e4dd
-
SHA256
32bda598eec5fb2e6c5e1aefef8a77dca6c7a773d694e901b921564747ababf0
-
SHA512
ff007874e3836453dc3b8ebeb7149186fe7e02684248246ac947336fd6baccdc9ca8a3c60bf08629b9c8e623134dbd5559d6d4b98e12f3dbf2a8c04c780226b2
-
SSDEEP
6144:oNPl+Join/YH+KlsdfZ1TLRIOjvX6uG7stJ61yzf0/8EuAgV:g9mjnAH+Klsdf3NIe6wzf0Lu3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4812 msedge.exe 4812 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4044 4812 msedge.exe 83 PID 4812 wrote to memory of 4044 4812 msedge.exe 83 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 2636 4812 msedge.exe 84 PID 4812 wrote to memory of 4960 4812 msedge.exe 85 PID 4812 wrote to memory of 4960 4812 msedge.exe 85 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86 PID 4812 wrote to memory of 3520 4812 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c091dfe9024f5c8f72dfe913248ea99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17060393589832442589,15312777008696285554,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\86287a35-dd2d-4681-ba36-d31a658fa7a8.tmp
Filesize5KB
MD55a47d358e11ce0eab24d1021c27977c2
SHA16af1ef115b9901ea491bc722fa751c91a083b2ad
SHA2562ae1b43c2b88a8f770593699c1a0d6293de5c0640d0491ebafdbd4837eb4afb2
SHA51267f01a2dec7f7af31d5de3c3e17901a43c905820a378dbbbeb56fcefed58cce86c2cb89677f20a70875fee4ebba7c523dc41630b7121fedb9f2dd4c667b7e92d
-
Filesize
6KB
MD5760ee1670aa4cf893896bc9e3bc050a5
SHA1cd482ed5bab1f0b806242a2f6353308325e21a25
SHA256b4905d93df70b5bfedf3bcee0adf9c351c83a04cc6fd48f38039cd04c90cba0b
SHA5122f36cbb5db6b0ea4ce93f74e028dabe34e8f7d1071557eddce080010ca3783762dc0125a8f2ff42da05f338dd9a10e65ce82f6c7bd3988dc556fcfec94e751f4
-
Filesize
6KB
MD5ab6a5b08a2b7aadd0dc29f3128939443
SHA19e98e95969dd4b2cac59abe2b806b44c3a5545b0
SHA25606e84840203131f0f8ef1a32de4f04f4461aede23ab0ff2e3c8bd714babba64b
SHA5123ba279002e0e37960ff263e2b499f5fbc74661a054bcf90d080d3a52293b8e39c6b2cce13016c58089571637813bd7dc8aa394bf3dfd768f1b79fabb1011662b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD557c20b1ec9e7496cfa244e485fc106f6
SHA12cc74eca32bb653f9b1cd18208a8366bf080c302
SHA256223860762529b6b8ad9f7a53775f55bec80d3520f2242b2ced197cea1b5846ad
SHA512756b3ed4aba4ff1d5b45281d493769dda10eb07ee899baf788895e5e2cb9ace3952d30301082e78d631e76fb9a64962aaf6239529e4c57c50137e67739fb8abb