Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
4c794dfa7cc4cd9b36feaf4a03770c84_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4c794dfa7cc4cd9b36feaf4a03770c84_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c794dfa7cc4cd9b36feaf4a03770c84_JaffaCakes118.html
-
Size
192KB
-
MD5
4c794dfa7cc4cd9b36feaf4a03770c84
-
SHA1
ae95f2eaf9d11f782a5cbc7860a616b91c635717
-
SHA256
f8fe6b918adbcf4292d154023bf407cf1ee5641343f5893d7430d31699aedb3e
-
SHA512
ea845f86b69b230ed464909125621374d3c1c271763bc6a014344837ce9eacb811f6ce3bfd640f357b2513113deb4495a30c854d3bd871c3ced5dbbd58e62a3b
-
SSDEEP
3072:4yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:1sMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 744 msedge.exe 744 msedge.exe 3176 msedge.exe 3176 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4016 3176 msedge.exe 83 PID 3176 wrote to memory of 4016 3176 msedge.exe 83 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 3236 3176 msedge.exe 84 PID 3176 wrote to memory of 744 3176 msedge.exe 85 PID 3176 wrote to memory of 744 3176 msedge.exe 85 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86 PID 3176 wrote to memory of 532 3176 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c794dfa7cc4cd9b36feaf4a03770c84_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffadd346f8,0x7fffadd34708,0x7fffadd347182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6580142356739973799,10936016901408712631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6580142356739973799,10936016901408712631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6580142356739973799,10936016901408712631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580142356739973799,10936016901408712631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580142356739973799,10936016901408712631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6580142356739973799,10936016901408712631,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5207cdf0d84975c2f4278078c3134b2c4
SHA14804e7f9eed747f789ff18e192d323770d25edaa
SHA2565128fc1394f496d204cae3a074b12e481dd43f66dbe044b686034102b1f181e5
SHA51240eb2d2099baabf14bc7565d64f114616eca20abf649c9d9c487ae2a2f798e87d6919179c66b3332891faa6cb167f473372cce757adb9b228bf210f2b7f24193
-
Filesize
6KB
MD516fe7458e235ee9da03a6ed03a855181
SHA10b61262737b82ec740baaebb03571916d5e7f0d3
SHA256e2b20d1e43d5b27033538b05df784f76b9558e75b9f6d61d625bf415a106bd46
SHA51208f4ae5ad6811eb63854a38fa5f312249b11c42558e45f157215151fb9d2ab97e14a42100dae5088da6dbca501299bce3755788565f22f852408fd36c93c5578
-
Filesize
6KB
MD5cdc7be3adc6e346a0a38f04d8c79b7b3
SHA1322413873db3c98d0b404162fc0f1a9372c1866a
SHA256bb83f9a6b54f21be4139853ec2e3434782a7648ab36de2b6a44a0d47a06d2816
SHA512d2b570c851e49010a586a4341b9cf55dc973c18a38229e2ad9db8637780df78a0aaa1469f2db39533c5540a2b419431c1e2b5816eb1229387223fe4f6740881f
-
Filesize
11KB
MD54035880196a19b9cf2f6c2d4601a8502
SHA1a1ac13cf95e9340dab86c0841e757cb82740c794
SHA256b452218b0029123596663e15f30c929408e3d230fc42496393d6c0e1f7394ed8
SHA5126c688daf3f4a9ffa2e3203e0e228142f16b69caf29d8bc90ae0286e10fb6a413119fcda0b8501d854ead1467c50a5d042e1a2644644892238217562fdd70c1f3