Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
4e50122f2a85ca271251b69b31559dba_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e50122f2a85ca271251b69b31559dba_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4e50122f2a85ca271251b69b31559dba_JaffaCakes118.html
-
Size
321KB
-
MD5
4e50122f2a85ca271251b69b31559dba
-
SHA1
856f5aea7dfaa472ead124b1e62cdd77de35a69f
-
SHA256
4321068a315a9cc822f5ac5bbd92d4825fc347fe30692b38d5ecf1b39c295df8
-
SHA512
499ccd78b8095197e205d0e00faa5f071509fd188bb2337ffed1e9137f3c276b76545027f88b58162e3509fe630bedd7af1a4a35aa305a0f17204c30641cbe7e
-
SSDEEP
3072:Face6QiP5vrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:deyjz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 3616 msedge.exe 3616 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 2576 3616 msedge.exe 83 PID 3616 wrote to memory of 2576 3616 msedge.exe 83 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 2980 3616 msedge.exe 84 PID 3616 wrote to memory of 4828 3616 msedge.exe 85 PID 3616 wrote to memory of 4828 3616 msedge.exe 85 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86 PID 3616 wrote to memory of 1072 3616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4e50122f2a85ca271251b69b31559dba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa970046f8,0x7ffa97004708,0x7ffa970047182⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1764 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3327081109537243864,10490922872331834275,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
617B
MD54f98c073c4cb2421891daf2ce7563d5b
SHA1c55807c51cb95a7c6345168827188e3f16a32547
SHA256e42fdeef67d1f79775911c56aa26e3d14d0a2cb7d26e66d55b53f07402d48099
SHA512c55778a744cc79902a15b3dc0bc5da8c7c71a35f23885a63e522e89d90aff3dc291a066141001f1690f32099a1c1a9ff53783dc3a5ff81c8c6c0312bded02db1
-
Filesize
6KB
MD5b8723701c3f491c79814be84e5a4748b
SHA15fbba381b66017a1c700961849e20b36465870ad
SHA25611077bf33272ab28b19892813f714d725331562e3d4a510438450e4795fb2471
SHA512f4f0613087f4b3cf347b08f8f47a2f6e575ab06da6ca9ed94ee69e6cafe0ccd263bc55ebf0621feba18bbfd58d4757856578819597a53140f6f5b608ac5c2b9e
-
Filesize
5KB
MD5fd334ed4c7fb2ba05cfe566ef3e83db1
SHA1c69f6534dc6c2012fecc6dcd89d291403510c3af
SHA256060d222b594cab42ae45e0b3650dd70686f169090a05be30f28c52c97aedb8d2
SHA51200e414c0c281d84e607655f5e838cc42e0310210ca5b104dea24e2289d0cc11abd43dc8f489cd55a4067b3930c3f9cc38206a9da85c7b2263d3fefaa41edc096
-
Filesize
6KB
MD546a3b73be3d84dabaafd8378db40e494
SHA128afde75e69423f5691cf73d580d1d2ac99f9699
SHA256be565a75d7d2fc0ab2b227d6431648422538073c7e80cd8f96254c5dfb7a6bce
SHA512d54b02e9a1f44051281e99f566b22ab2ac95077db3ff401e3e90f2a422c13034f5016c51eafde2a91e423a3be8b423d1cee43c407f52feb86487c3f297925e3b
-
Filesize
11KB
MD5fc10e8e6bf9041a61fa09d61d1a73069
SHA14e4cab99c19f196237b87c6ced751c2df9c3a67b
SHA256228c97d5c4d0bb8b87c0efaa34c215f9589d41e7695951d8d68681d80f4253ca
SHA512aa021451d49746e08a74ccf70568c3c2fe6efe72fad16df4e6df6ec96a648644d85b0a1799b3c8b17c3e5c7a44888619fd3e1f9a7f9805fa7aa62ee9ea2ab636