Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
4dc694a7974edd1b0552587908ac00ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4dc694a7974edd1b0552587908ac00ac_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4dc694a7974edd1b0552587908ac00ac_JaffaCakes118.html
-
Size
213KB
-
MD5
4dc694a7974edd1b0552587908ac00ac
-
SHA1
441df42ef152d32b3eaaf3974c83be9bb4560e6f
-
SHA256
0991914113aa7b7f4973ba89fe383992a8a0b1df2d040c6f75ed1eef679a8773
-
SHA512
3024dc90b2ad636de0e51c45fa82b25a23995c6c7f29b863f65f2d9d5eff4829cef43d10e324844b188e0b1be57200d0aab2baf2ee0bad2305ff8dd0c7ebd4f9
-
SSDEEP
3072:4rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJg:gz9VxLY7iAVLTBQJlg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4048 msedge.exe 4048 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4788 4048 msedge.exe 83 PID 4048 wrote to memory of 4788 4048 msedge.exe 83 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4312 4048 msedge.exe 84 PID 4048 wrote to memory of 4652 4048 msedge.exe 85 PID 4048 wrote to memory of 4652 4048 msedge.exe 85 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86 PID 4048 wrote to memory of 3960 4048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4dc694a7974edd1b0552587908ac00ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa322e46f8,0x7ffa322e4708,0x7ffa322e47182⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,156950964839405095,11325833461931187566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5e4789215d363bc02a374603cc23244a2
SHA16590f6fd1447ba406ed308571c94d270de9c8f24
SHA25651208ef8b61ef5cdac6f2741bdc731c67399ee236f0e0300d36a8570c5c53ca4
SHA5121b65a925c88e43125adc671f9a76892bee077372e02e03725115c66f4c03110603da3b22a17ea9d22602962108616a483b95f89ccc22fbf03071caa097c10f03
-
Filesize
6KB
MD5de5f1cf3033e08d076e453aa5593a23c
SHA135b2267af83b1fb1f9099c2a67d4d6ac67d6d7ea
SHA256337a4dc642ce6e1796d82d3e7b8f4fd3866330db2ec8b6a7d75b47141ae05efd
SHA512ca827620391661fae53013f1bd9560b535baf780f5fb2d6192fc723c5bb1dc1d6b695e72360567cb45eb5880520a5b7c349ffca5fc589308cd3a15d28947d581
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d5a800a7305d7c85a17aa0007b319a4d
SHA1960c41d08367a0bf30f2122eb7997bc469266bc1
SHA2567fccbb9b6dee27491947528df0c164cc0c0e0fb40f7df56cb7a575afdded01b4
SHA5124a0d3025a13972009cd8540be0bf4f21eb3ccd54b02764bf836409502a5b3db8473ba2f6bdc3b232e985934f8b9f521089c5faff6aa9a8a8ce5b1889754bebd7