Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
4c8da654caaaa480cf60d2e460273a7b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c8da654caaaa480cf60d2e460273a7b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c8da654caaaa480cf60d2e460273a7b_JaffaCakes118.html
-
Size
19KB
-
MD5
4c8da654caaaa480cf60d2e460273a7b
-
SHA1
e54d6e991dca7ead0febd98cfa00953ecad66b07
-
SHA256
53904a4faa825408aab585bda2c34f1ef3686652f39e218ca7768a350c1a23e6
-
SHA512
df4feee34cea25833f84a44d34fb3f1a277c938292b3d9fa7ca8e52dc5f772476beb62c5519ff6f6c69e1f29eb0cff168b63df57b1325e4983df9bc76db61162
-
SSDEEP
384:THzOOT9Qiloq66tRCjB3peK4K7mDjMIAc4/Xhtcxrty8cQtbZvkD3li6QZ2EJ:BpDuq66tRU4K7mAPjli6QZ2EJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 2452 msedge.exe 2452 msedge.exe 368 identity_helper.exe 368 identity_helper.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3560 2452 msedge.exe 82 PID 2452 wrote to memory of 3560 2452 msedge.exe 82 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 4604 2452 msedge.exe 83 PID 2452 wrote to memory of 3068 2452 msedge.exe 84 PID 2452 wrote to memory of 3068 2452 msedge.exe 84 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85 PID 2452 wrote to memory of 4872 2452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c8da654caaaa480cf60d2e460273a7b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83e1046f8,0x7ff83e104708,0x7ff83e1047182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10200929050146852134,14857377800240260694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
599B
MD5096516bd24940f3e22520e35562851c8
SHA15aa153b2b006b949132d42e898da93cfab8debe8
SHA256d9ae7abab0301b0f9c3339a52827e98b2aebc968538d6c8fb063f06fbb1de8e8
SHA5122bb8fa29a5d159bd893e056bac4bed731d4f0f09711cde9a3ad2a5bb3be9fffeaf8497d8a8509508a56abb554dbf9af86e658bf70ac6f406b8abd5434350e1f0
-
Filesize
5KB
MD5410aa4f83791016b41b09ba27dec0d61
SHA1a767c9eebe35886638a48207e78d085df102281f
SHA256c057178ba6ca48188bb94b73ab6e08c29b4e841de6ce5a03e67abfa65ac1fd3e
SHA5126b73da5ef3422714cbf69046a989e9765432df36e71fe403d25a35401d70474cf135139d0facc84de71b240334438ebab5dbad4c3751de744d5300e5546341b0
-
Filesize
6KB
MD50324297e760c01af0b1f456fabb126c4
SHA1bb8eb9a29d9e34eee86a3a0a4338ab17fa774f8d
SHA25612fd421c99fd30602ff2f1bccdb646f910cc9e2f529f1b9d901b9bbe8890b59d
SHA5125d1fb090654149c81bc083dee6fe17563926786ea2cf656740d413596ba043431df1c61be171732eb1c51ecede08bc203c2bdc5cebd9a79e33f65bf5a0a4564b
-
Filesize
6KB
MD5cb1a3962ffa971c2e35001436b2303af
SHA1491f1439c83680c9ad28e66fdc9f9c9a2e204092
SHA256a661d7ce3e7af3f1eecbac350a27100f8752914348c5b7da93e4e9694ad79852
SHA5121156589e2230ad2ac51aa22e2af85e617c9ef7cdd7f2703687dd0a47cc01416a8560cc7409fd73ec81344ff9163d0811a71b35eec705a674013d15fe732d54f1
-
Filesize
538B
MD5b36555b520b71062dd08b6b416adf561
SHA1d876055b1ee645370c2f04aaaa4f90a0aa12116d
SHA2566f811da6a277699522b962cd27d8680bf031a228caf899756291751670910af7
SHA512a3ab2321cf75a87b2b63ed5a99de6c61db76d60d956af89fe2917f33e6d007ccb31f30d650964e1deac8a7ca180e6b5cce20fe7b9e060facb192c8a3214d17e4
-
Filesize
538B
MD552cedde72f21721aae4e79157f85f7d6
SHA1cb9482b95e1656c01335b061aa69c8e5b6aee571
SHA2568e552e22c4d0bb3fdc5ba9920d0a4a77c07a98dc49c86ed9dc77a9f367034465
SHA51290fe084ed1d0b6d0d189061ad91ce5ce567285d99b0e0f179ebda3de20eff3a4e1ce335987399306b913446547988973dde3b3c4a6c1623e8087753e6722b3bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52fa030a99181d27cc9e63b0b6a019184
SHA15c21349d6fa9365d96f4332e3ad650805c574259
SHA25680b98c86a7627b22b742be807b4fea59259e987dde974556b1e8a81890440197
SHA512e8bd0f89f7a4e822fb6ab550c4634f9ea9f0d3793f3e4f641fc14f5d31f8dca72cdbbacc2dc3bb7fd0a98129db05df7110fdc51bdb9967f2e5e4d0dfffbea3f3