Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
4ea6c494af91c7555aaeec11a9e0820f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4ea6c494af91c7555aaeec11a9e0820f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ea6c494af91c7555aaeec11a9e0820f_JaffaCakes118.html
-
Size
13KB
-
MD5
4ea6c494af91c7555aaeec11a9e0820f
-
SHA1
223a7691f28f7296a6238de15de3ec2692d794bb
-
SHA256
b1b29fda68e321d44737d7edb6145a02b8783e9cc815fcabeea0e128acb752d6
-
SHA512
b86eeff1c2db043e504b16f3bd9c52e3ad30f66438b9ca156517a3e32e1588c797802929d75e5677a46a54b6443e3d86af1652bcd51c4d6720a4f2b7772380af
-
SSDEEP
384:pXK66KvfVWEG/yFuGwyFwtct0ZSFJ4QtPoth0rduob:Jt3VN7jNtPotCD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 4028 msedge.exe 4028 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3960 4028 msedge.exe 82 PID 4028 wrote to memory of 3960 4028 msedge.exe 82 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3440 4028 msedge.exe 83 PID 4028 wrote to memory of 3180 4028 msedge.exe 84 PID 4028 wrote to memory of 3180 4028 msedge.exe 84 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85 PID 4028 wrote to memory of 2940 4028 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4ea6c494af91c7555aaeec11a9e0820f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,7771196125836445353,259666231261847362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
390B
MD5e851b28dbb45fad0cadb6f3e172a840d
SHA1b71f23286ac65d130f484c2710ee6cabf9b91b26
SHA256ceb8310dd5b4aec9bc63f79e0e56da4a40235bf5578355d7be04cca25f67b88c
SHA5122c76300ef0c930d79ca3980d623e0ab7e7da6d9df6c84d30c6729086dc6614ac3bd5e5c5775259f0f8015bc66b2d170e52c34471b72514e39fbe26500196e072
-
Filesize
5KB
MD5538351a0d703aaba8b7156ca6d4b03a5
SHA1f04a3ea8544d1558789f42f3822ff2d7bbda266a
SHA25651faf71443161b9a46abfea8d30a6257ab4146795f901d4956f26f49334e0709
SHA512e3a793c2ddae161939ad5beae61641d8c40672befa13cadf20f73ec69c6b53f7f31e63a56c72c5f81822087a3d03214a22a598c41750b87753a36a8410bba822
-
Filesize
6KB
MD5de68b4e31ce01d09e9881cb2df6f7f04
SHA19a23247ac6cb8d04bdc79b909c85039105511cca
SHA256090c902c3d4288c6091e15cb65cc08e3aeb44a13a9427136fbb4b7fe6d05ff3c
SHA512b8b4009fbc99ca5409a862cfc23938516ed4be522162b1ed61477e4c524ca36edb9f7dec55267f87da73bb625889dd0b8db83463604b309297cf9c5fc40973fb
-
Filesize
6KB
MD51dbac3c9b8119ba6ba8d2345d20b8834
SHA1506a6939c4cc4217ae9cb48a90c91f0bdc4f5881
SHA256f29f13b39188596e07dfce0f9ef220d28cca5ad94401a7082bd19b03911ed533
SHA51299e7d96d8c2af3751a4a57f574f2da7306b8e7c9306969df564ca19fc6ce555b5ea8108343524ee22973580c41bf5a7b4d1decf975a41d43d0d8531e24bb76ed
-
Filesize
371B
MD55cca38e9ac20e7d602abefaaa6608b33
SHA15fd03bd2b8383ada3257a5308bccb27ab6847e62
SHA256af5078166a5b01f1d41b41b9dbfba81a18e41a6acf53cf5d54ef3e49b62d1b00
SHA5129fe3be6a0a02f31a2cc32464e7eb756b90f0e7a7f13edef760a853053257cbd04854e4587112c9d3c604be065078db55443c474907a3f82e4c794a3b312c7c9c
-
Filesize
371B
MD5d74875d76545006df6706252cde01101
SHA14727b7233cb110f131899bf2121abfffca1d5695
SHA2564fbcfb1770ce529f3ce8d540801db4dc83c398e90284a837dcd1a09c7fe606e1
SHA5122f0c7adb7679453a536f11122bb2a561942493e12c173a2192ce5f61c5d6aeef4d6eeaa3f18f35a06e69580fd79052010f9ae72cba39f5007c10cb22927a068b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5967b5a4871f79f5f5bb6aebe89269602
SHA1e9069ffd7adf329c19ab9c0355ece6b6836ad06c
SHA256124fc289bbbc08f58e42bad043ee2a62cabfc474c0eb6a4c1f4b39f7ae212556
SHA512775741d1c500e967c11c689863a04328cacbadae6ea58b05ef177312af54209623f1c802d024e1e331caede9991c0970e9b7e1055f77651c6beac018fb0a4396