Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
4f2ccc76beb675ed8b6f59a24ae43c99_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f2ccc76beb675ed8b6f59a24ae43c99_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f2ccc76beb675ed8b6f59a24ae43c99_JaffaCakes118.html
-
Size
22KB
-
MD5
4f2ccc76beb675ed8b6f59a24ae43c99
-
SHA1
b48c4d9f9c98a8b447931677578ec66debfb2e4f
-
SHA256
22dfdbfe917ff799d3e8e7e7454683bc7a586695346c9a1c7067351dc265701b
-
SHA512
c08aab646d258340d86a7404fe4a22731c98247dc3d4e3fa5725e1006520717ae1fb30282683b677efe794320c67811485b02f52fdc70e993addc389526d05ba
-
SSDEEP
192:F//V8IKp/DaH/IizeuBWzdWBAs9T5V+20W5ryyjVzM/zzReYbLValM:F//V8IOoWzYBAs9T5V+20WdyyjCteM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 5348 msedge.exe 5348 msedge.exe 3764 identity_helper.exe 3764 identity_helper.exe 5752 msedge.exe 5752 msedge.exe 5752 msedge.exe 5752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5348 wrote to memory of 816 5348 msedge.exe 82 PID 5348 wrote to memory of 816 5348 msedge.exe 82 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1128 5348 msedge.exe 83 PID 5348 wrote to memory of 1012 5348 msedge.exe 84 PID 5348 wrote to memory of 1012 5348 msedge.exe 84 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86 PID 5348 wrote to memory of 1480 5348 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f2ccc76beb675ed8b6f59a24ae43c99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec946f8,0x7ffa1ec94708,0x7ffa1ec947182⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12780456701573161495,16706835059702250732,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
188B
MD59e60751db3c2c5b6a54f6cb18f9a387e
SHA1c3815742501bd3eb5456958d253c57fa48f14451
SHA256376006f8fffee91ede6e6367fc46a81ad97568e59ede6bfdc1aba6420294d6d1
SHA512e25d565bc4a56dcdb10bb2eb9daf4b031746652cfa55658f35331bc72b0dce59861fbb0a3923857a0382e1b0ef6f38022b13f34e84133567f37872738b12aa96
-
Filesize
5KB
MD584dc7f911b6ee59096695fc22afe5fe5
SHA14d7ef4af2ea863d2361b60adac07828bdd0bd76c
SHA256e3b9b7cb85f84af2eb03d90ed285cc2c3819c2ceba8c8f5011f65d17ccf6fd72
SHA512e36bc3077b1cc9c0e9985ec7efd788027cdb24bba03b2860b305c5178f1d0a93947d23458f45b659cb598e8288bf869ac98c26ad8528eb15243b2c183f213202
-
Filesize
6KB
MD57eb830735a3ed791de069cff125f354a
SHA13cfeda978161bd1eb049489f77ad06fd3a53532f
SHA256ee9d1ecaa7e9be082aa8304dd210b426ac7aa6d54c972eec845607fec42acdcb
SHA512c40822579cb3d4c9ab918fd0a12c9c75c6d3b3c2ecfc6289345b2b9e02fe0b2c77f620fd6f04eba2c7addf2a0400f8213fae6f084c8fd40eb0f6deda680b67c9
-
Filesize
6KB
MD539a4ed6948c55f3939f44f2707b853e2
SHA11640bf05e031791faeed79de952c545798a5860f
SHA2568d421c932e0ec485f859281c0f777ce60e4871ee1bbcb0dffa4997c08867da55
SHA512b769a6415779926bac38c7c4661398b43c4ecabdef5b5fb4b56d3ad94d23b9843b09bb50753c738e2892b12edb797ced1ed37e0a9f2a171e42360d677220b053
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fa560b720e97ef909a6992fe3d220462
SHA1981b0a5a4250f6b810afb6a487446f7321026bb8
SHA2569715f2201eb26bfdab754070d9a6c97929449d6a523f9c119dfd9552927100b6
SHA5125bc34df43da3b67b9514044c2c7c26af5a5fffdce7ff59f4b069d02f7d08830dd169d0b7505a82367cffa1d4d161c8815ed5d79d1b57de01bb638b363125e284