Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
4cc1d3488b016c94f82c7b53fcae91d4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4cc1d3488b016c94f82c7b53fcae91d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4cc1d3488b016c94f82c7b53fcae91d4_JaffaCakes118.html
-
Size
122KB
-
MD5
4cc1d3488b016c94f82c7b53fcae91d4
-
SHA1
b8dd16d72aa180a493ef01f54cce8413e64de055
-
SHA256
5c84e379d8d98eac7e8bd8fc4ddd76ed5dce825058b7a5aa8ec18e1679e23551
-
SHA512
18749a44b39048fb61eb070ecf0d10ae3e943117317782b4c9aca21f534bb6bc68b6f634b780bc4721bb8e322ad7e830a52afbc7f1ba9db161497f81f37129c1
-
SSDEEP
1536:JoMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:XyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 780 msedge.exe 780 msedge.exe 2568 identity_helper.exe 2568 identity_helper.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe 780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 780 wrote to memory of 3032 780 msedge.exe 82 PID 780 wrote to memory of 3032 780 msedge.exe 82 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 5028 780 msedge.exe 83 PID 780 wrote to memory of 1480 780 msedge.exe 84 PID 780 wrote to memory of 1480 780 msedge.exe 84 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85 PID 780 wrote to memory of 4540 780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4cc1d3488b016c94f82c7b53fcae91d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc074f46f8,0x7ffc074f4708,0x7ffc074f47182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,77691852840794934,1257636486316041560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5fa0e57c510c46d10aee1f36a5c9d6e72
SHA1bac01e310da4a5bbe5ad0ab8aeb2b1459389753e
SHA256edbaa87aff52e862ba70e945e8b259363be662e372f85b91d585e164e79bf1c4
SHA512b60ab514ca76ecba627fd1fb27aa6c4f1413987be0c3a7e30762ebc3aaaca5401ed1d54bcef381bf1863a9c4e9ac2a957d542261cafb367818376218cc185442
-
Filesize
6KB
MD55f50db7b7564532ce5dd0ed34f92fafe
SHA1914f5a6596c9418c049f5ce83ea6832b37f0b47b
SHA25697254c51d69e9e1e447fb963cff41c2959045c400e22b94bd3c0fc9467d5f1a3
SHA512029496746e64ec33e97226069fa69c612cc5ddca29b09bc51feff4730d32724eb488628f294888f791b39ccdd750cac49d6ca95f052322c5861265ac2696fc64
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5be6ecaac7a4aca0f32575a112f34946f
SHA1419c3b2689648d841c5b6323408843520c4e74ed
SHA2562577a4acd556de61725334a4e18d9d3e9e3936059dc741123bc7eb9b1fa156b7
SHA51264a4b075d51f703205813b6c0514a65af470ea226be779d2146d92bece169ea2d65a7d1318c1307a5ee742f78a40292f5306895ea04507a1658e89b1768a122d