Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html
-
Size
68KB
-
MD5
4f437e1929aad0d0f3db654c0452a3ce
-
SHA1
ab2bdf1bca55df2b7d74fd6365ef4d4ace7234fa
-
SHA256
c8dba945a8348a3074ecc24bb1c5b0a5d0ec854342d6c1f667b160d8b0900c7c
-
SHA512
baf5693a6c4c05a2d2a218a8f8dc84d6ec23fdb7c469a3712b36ed2fa92a3a3e4f45207251f33ad7c59133aac1e7db31c971a46f18d72ff4b0d028b7ab86a2e7
-
SSDEEP
768:JiYgcMiR3sI2PDDnX0g66ReSGd68SNoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JK0/zTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 1236 msedge.exe 1236 msedge.exe 348 identity_helper.exe 348 identity_helper.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 4952 1236 msedge.exe 84 PID 1236 wrote to memory of 4952 1236 msedge.exe 84 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4912 1236 msedge.exe 85 PID 1236 wrote to memory of 4288 1236 msedge.exe 86 PID 1236 wrote to memory of 4288 1236 msedge.exe 86 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87 PID 1236 wrote to memory of 932 1236 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb042146f8,0x7ffb04214708,0x7ffb042147182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2656 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7842853101527386824,13273505639081129040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD595d975982630e3191744aa7b5cce9ba8
SHA10cc980763c212f822be4f3a471d60c1df60e0e5d
SHA25666c43414b289ec04e7192a8ab92055c89f1dfcf35c24333cf515bb81b8a5e534
SHA512ba90d74f4d206fb91e0f13e7e0b5d00ac63ac32dae4b0b414f485a05f8d589cc9ed404821827a65cd0d7b7ef83abfd565f1cc0e8ed5df81651e0c40cbefdfec6
-
Filesize
6KB
MD54f9b7f17b6b70c00bf65c80df356c962
SHA1bab1a5aa288826da12081cf4e0ccd3ff64bef538
SHA256139d53242da92511f45fedea429d01a9f2ea84729798cefd2f1524a7935c662e
SHA512cb40b3963082698d128de00bf5cedc0f4dcc80547b585289eff9f789dab3b8e33f391f80aae745ee6b6f8a54e38a012afb0b0192f349487314daf0c537931420
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bd864e5f1b11d711f99655264faeb478
SHA10190cadc7dd013645c33062e94fec4df4c812fbc
SHA2562233ad6b077ef42a45261e1b166afd06d064354155eea19daa19f7a6aff9d2ba
SHA512b460aafbc3df1049adbd76a9f553746d94475e77d11b0493bc4df4e85a1e2c07686c2f2c8316c8b2d725549f891ca5a6908736cbc594fce99078c1e7dfbacefe