Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
4f838f386b4466b969c1d8ce493115db_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f838f386b4466b969c1d8ce493115db_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4f838f386b4466b969c1d8ce493115db_JaffaCakes118.html
-
Size
18KB
-
MD5
4f838f386b4466b969c1d8ce493115db
-
SHA1
fdbb3e4b996d1b706dbd0821c38137812ab1dc01
-
SHA256
ef6f84e5a1510d476cffa90dadea9cee59065f21ce685f2350a8ed1e8a664fd9
-
SHA512
5443dcbae74ee819b960ed9eb1cf10115bbe5f257693ae6ba99969d312c2eb9c3fbb61bf2fae3f4b3e7daef9fddc63ce953c3f1a189bb7a7320441c14a449124
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI04izUnjBheA82qDB8:SIMd0I5nvHbsveDxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 1168 msedge.exe 1168 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4564 1168 msedge.exe 83 PID 1168 wrote to memory of 4564 1168 msedge.exe 83 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 1016 1168 msedge.exe 84 PID 1168 wrote to memory of 5004 1168 msedge.exe 85 PID 1168 wrote to memory of 5004 1168 msedge.exe 85 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86 PID 1168 wrote to memory of 1164 1168 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f838f386b4466b969c1d8ce493115db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a47946f8,0x7ff8a4794708,0x7ff8a47947182⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2842543831251287971,13926375611356758639,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,2842543831251287971,13926375611356758639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,2842543831251287971,13926375611356758639,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2842543831251287971,13926375611356758639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2842543831251287971,13926375611356758639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2842543831251287971,13926375611356758639,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD51d4fca1ba5785417a2f0cb8e15825943
SHA1debc7499edf9088089ccf3ac456f217cc09c493c
SHA256de7fec7ce5271dbcaf62875ebfb05ed8839674a349d0db7b83279a268bfa88d2
SHA512ac75e6da883ce7bde268b073f6dc18008ef802804d68b3af2a8fb586c2b3901b2e3211430cbea754103b8da8cdde7abe01371177c50c3ed41d1b5789796be4b1
-
Filesize
6KB
MD503f639fdf7560810b6c20defae319a7c
SHA13c27c7181555a4f928d3bfa2be66cf36d7b25356
SHA256a27cdaf6cc6d028d175e2efe9759ff9c9bfa5a031d87af206bd422c75a08ade1
SHA5128da2779e776e8c6d8bd30dcc3d34b9f76060f7c1bafe63e4450aab7e21733bfd6530ca0cd3d66a51b86ce89a7c528d414118ec76d34aa520ad41e74ca6b73ac5
-
Filesize
6KB
MD50e82ca1ce27f6bbb1b2f25554d071055
SHA142a005b6fd0dfdbc1221831967c1e2be860e1442
SHA2569e91e7c372e3b9da321813a8477bc9d910dda9fb32bdc30947fd1fb2c87ee8b0
SHA512be6fceefa7bc89e49cbce410313bedc9870fcfc1da0e0cc9cdc7601c938a5e1d464849227867c9c07f8e7fe59b24a043d1435e217f664f98ebf11719837a5a17
-
Filesize
11KB
MD50db1cf7c297238011642e8350e553cf6
SHA1684e2ff4d7dd69038727478674a6878dce2117e4
SHA256b823d2b39becb8a324cd4e798fc4881fa9a17760eeee284cf06f234c61a53995
SHA5123112e5b8c35809bec4c278f5c8353826427bfd1ed2d0b0aad36538866b48df7c3122bf63f18644de8bdfeb13100341fb96240283b46619bbc7ead3138d5039ce