Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
4f84dc4e0db55fe20af51359b2399c58_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4f84dc4e0db55fe20af51359b2399c58_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f84dc4e0db55fe20af51359b2399c58_JaffaCakes118.html
-
Size
76KB
-
MD5
4f84dc4e0db55fe20af51359b2399c58
-
SHA1
fc49e1530c03d24adcac889d2315d9e070e5622f
-
SHA256
6a0a3d0e8763919aa6624d39c8460d32ef6ed685061ad39cc5e5bcfcb03c88f1
-
SHA512
54bfc58f8c83a8d9c1a1a80b9c3e7523c1b94bfd1eef73c36d66d47fa08dfbafd4a9f21aa920a62c295c16a0d70d341ca12ea0f70fee303b336c84b51013eb8a
-
SSDEEP
1536:QGISD1c1N1fXKcKXQeeeeeekjKeeeeeeLJeeeeeeNKeeeeeeF1P9SXpM5RRg:bvS+Rg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 3196 msedge.exe 3196 msedge.exe 5016 identity_helper.exe 5016 identity_helper.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2324 3196 msedge.exe 84 PID 3196 wrote to memory of 2324 3196 msedge.exe 84 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1500 3196 msedge.exe 85 PID 3196 wrote to memory of 1520 3196 msedge.exe 86 PID 3196 wrote to memory of 1520 3196 msedge.exe 86 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87 PID 3196 wrote to memory of 4548 3196 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f84dc4e0db55fe20af51359b2399c58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e7f46f8,0x7ffa1e7f4708,0x7ffa1e7f47182⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,191624960580173129,15031987432237070015,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
897B
MD50dddf699fc8128eb6a0af6e429c358e4
SHA15adee2d8f41c2ad82578fbf15f0900966e1a8c5b
SHA256968ab01ec2df7a27a6d4ee493556a127560a200dd9cd9e187cd3612754e216a5
SHA5126b462300362ca2903389374e2ed72b8e488657865ccc2532ff88703bba7e3a78323feb8eb337083baa87934c9417c4f32a1822d9fb7e3a0989ec2723fb91946c
-
Filesize
5KB
MD5036873d16c82907869db5be0903bf648
SHA1fbacc55d5b42179e138c5721e758104fbe09dc0e
SHA2565aed94eb597d277d7d76e95c2ce4a60fcf4b9f6307be7cbc2aa4fa0bebebf0da
SHA512475b4f66a5dc1b34bdade1cfbf18bacbb89ff95480e78c922c0edfe0b4bf74ef3f9b40dc9e012c01b25e5c188560b8cd738fb5093455bca3499e4068b60c989f
-
Filesize
6KB
MD5d5050fda816e134d1349dfa66d8c29b4
SHA13d0231d2dfd519d1aaa1ff26fb952488a7c1b385
SHA256916d66397e8f9770d8db4b796ed3f17f7be84876cda26a24bef26a5ec4826196
SHA5122f003a8d086f668d78961b47d8bb28d7ca9fbf0fa397dc61a84a5c7693a89de3700f6fce284c732dd5b6ee72665d92d019c47985b130957d8266a7878b9815b7
-
Filesize
6KB
MD516dbfcfb36d8b3351b056820642afc4e
SHA1455b1d04593284ce9da7bef6f4ce888611197dc5
SHA256d0fff0f6f518eff35ade1e6e392f4b154a28a5f325bf5d13f1932605a1a92b55
SHA5124e9112662e53b7bd60fc4bb11967f379e26b4c1ba59fe0b0e00fa4284fc5db3cdbe59e86e4533d2bbb99b669a1bc55617c2d3183b42567ade95ea44980205f73
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b093ccc6d4d1c47fda3bbfd0a3b229c4
SHA14c7bad49cc5f353e6d171f7c908188398dfb9cdc
SHA256a0b5b7e30bdbc16c592457cf21a30147907da9aecdb55f556046417da8caac07
SHA5123d8ed9b51827925cd031789a5aaf1b579782b24a652e18adfe4f8aa547bc83b59176f8d5a4b04a67f10dfe91d8e488e66b8ad839c2e32744f9cd704915140b04