Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
4f60716a8143862fc660fdba5262a8f4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f60716a8143862fc660fdba5262a8f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f60716a8143862fc660fdba5262a8f4_JaffaCakes118.html
-
Size
30KB
-
MD5
4f60716a8143862fc660fdba5262a8f4
-
SHA1
80f3e2e027dfa074e7c59caffe1f07f60ab704d6
-
SHA256
d70a0a886fc8a503a434410b0b4b019bbfaf819b545dab4527f4a66de723ed59
-
SHA512
5afd262ad8a24859c4f690b6f02b1af36ceb94a225d3b99d83fe723cec033d821c36aeee29781a9bd37a4a6ad4c212913fa4aec08e99fdb4bfb3784a8d4a53dd
-
SSDEEP
384:Sx/ijue7mC6UdR/uqLLtDqDAL+qLjuw8p0lMdBV25q0uV7S4C2Q:SsjpQUdR/ZFqDA3npUWMdyQ7S4C2Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 996 msedge.exe 996 msedge.exe 3160 identity_helper.exe 3160 identity_helper.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 4444 996 msedge.exe 83 PID 996 wrote to memory of 4444 996 msedge.exe 83 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2100 996 msedge.exe 84 PID 996 wrote to memory of 2320 996 msedge.exe 85 PID 996 wrote to memory of 2320 996 msedge.exe 85 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86 PID 996 wrote to memory of 4200 996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f60716a8143862fc660fdba5262a8f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaeba946f8,0x7ffaeba94708,0x7ffaeba947182⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,14175746228680805936,11375487743535807085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
399B
MD5762dc2b3ff129e817d42487da865ff68
SHA1edf3f3fcde169eae9d23fee6c7870c74c7bffea1
SHA256b327ebe00d5c7637cf26fd7615982862fe0776c2dc78f63829f6a388c5c28267
SHA5125b2eb6300e6cac491b99c19981b4c53d2828d4cfbecd56a2b5a4f56a9c1ba5c1a71fb2dad452911d56f4bd65bec2ec3531688e72d64566070421eec03604188d
-
Filesize
5KB
MD59af29fc5fc0be3c4d3a592ae0d11961d
SHA1fe44564eb503ee790ae9bca092538b6ece0768ef
SHA2563773801613e99345e7c99b93289030f8434db0293fb0a4143f362134bb0be31f
SHA5122274f780151a6b8540dc4defdcf49d01a6c5219857a7f9bcec0bec96d47b4b5eae528feaa8ca09917207ecdf6ad319f0cbb0d52bf80edff72de07a086d261dd1
-
Filesize
6KB
MD50318ca20ac91c7eb12b87782e22607e3
SHA111ea200edc564bebf1f39e3fc06bde85060f5e44
SHA2562cdf9ddc92a6fb227a45e1d04ac505a8485d77f93cecec253d9345c66d13cab6
SHA512de312d41d9a322a5b87911b0176b8400ced27fb11ae4d3b7e0b142d4216051d85de6453f524df202cd240688ebe405cc2b9e4b86417b446f591ffa40d0b2cc7d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dc939aa035d07723ff2c1c2b84dc792c
SHA180b92c669959ea5c4c3994b787dcda97b741cd6e
SHA2566b0a7f71d0b7780c51428b574188546a5d0d65993adc912c1ec8e0dc3f94874c
SHA51268119dd731ec934e75bba3091f6ee40b1566b81a8820a1cab8982996000444b2eb8f220410dc9a3cb62ce8794b053d851f6171305e64257da579ee00b3ed0a8d